A Model based on Cloud Computing for the implementation and management IT services in Banks

author

  • Najla Niazmand Department of Information Technology Management, Electronic Branch, Islamic Azad University, Tehran, Iran
Abstract:

In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confidentiality of data, the need for high computational processing and also the high cost of change or development of information technology is one of the problems facing the industry in many cases, have had many complaints from customers. Cloud computing is a new IT investment projects in information technology and new architectural development, deployment, implementation, and service and is in addition to cost reduction, flexibility, high availability and cost money being brought. For this purpose, GreenCloud simulation is used and presents graphs of monitoring, resource allocation, workload scheduling as well as optimization of communication protocols and network infrastructures in the new model infrastructure of Iranian bank and it is compared the current model and the new model for the applicability of cloud computing technology in the banking industry will be discussed.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

a model based on cloud computing for the implementation and management it services in banks

in recent years, the banking industry has made significant changes in technology and communications. the expansion of electronic communications and a large number of people around the world access to the internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...

full text

Cloud Computing - Web-Based Dynamic IT Services

Bargaining with reading habit is no need. Reading is not kind of something sold that you can take or not. It is a thing that will change your life to life better. It is the thing that will give you many things around the world and this universe, in the real world and here after. As what will be given by this cloud computing web based dynamic it services, how can you bargain with the thing that ...

full text

developing a pattern based on speech acts and language functions for developing materials for the course “ the study of islamic texts translation”

هدف پژوهش حاضر ارائه ی الگویی بر اساس کنش گفتار و کارکرد زبان برای تدوین مطالب درس "بررسی آثار ترجمه شده ی اسلامی" می باشد. در الگوی جدید، جهت تدوین مطالب بهتر و جذاب تر، بر خلاف کتاب-های موجود، از مدل های سطوح گفتارِ آستین (1962)، گروه بندی عملکردهای گفتارِ سرل (1976) و کارکرد زبانیِ هالیدی (1978) بهره جسته شده است. برای این منظور، 57 آیه ی شریفه، به صورت تصادفی از بخش-های مختلف قرآن انتخاب گردید...

15 صفحه اول

the innovation of a statistical model to estimate dependable rainfall (dr) and develop it for determination and classification of drought and wet years of iran

آب حاصل از بارش منبع تأمین نیازهای بی شمار جانداران به ویژه انسان است و هرگونه کاهش در کم و کیف آن مستقیماً حیات موجودات زنده را تحت تأثیر منفی قرار می دهد. نوسان سال به سال بارش از ویژگی های اساسی و بسیار مهم بارش های سالانه ایران محسوب می شود که آثار زیان بار آن در تمام عرصه های اقتصادی، اجتماعی و حتی سیاسی- امنیتی به نحوی منعکس می شود. چون میزان آب ناشی از بارش یکی از مولفه های اصلی برنامه ...

15 صفحه اول

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 4  issue 2

pages  430- 434

publication date 2015-12-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023