• TECHNOLOGICAL BASIS OF “INDUSTRY 4.0”

    DEPENDENCE OF PUBLIC TRANSPORT ON CLOUD TECHNOLOGIES

    Industry 4.0, Vol. 3 (2018), Issue 1, pg(s) 23-26

    With the majority of the world’s population now living in cities, the importance of distributed transport systems integration is increasing. This requires improved integrated transport infrastructures and communication within cities to reduce the cost of congestion on the roads, provide an efficient and convenient system for travelers and improve the management and future planning of public transport within cities. By sharing large amounts of transport data with the public, including automatic passenger counting information, pollution and traffic congestion can be managed to better levels and subsequently lead to improved overall public transport services.

    The present paper aims at arguing the growing dependence of the efficient urban transport on the new technologies. The growing demand for cloud computing together with Internet of Things is based on the numerous advantages going along with this technology, provided that it is used appropriately. Cloud Computing is a revolution that will define Information Technology in the second decade of the 21st Century.

  • TECHNOLOGICAL BASIS OF “INDUSTRY 4.0”

    SECURITY DYNAMICS – ADAPTATION OF ICT INFRASTRUCTURE TO CLOUD COMPUTING – THREADS AND OPPORTUNITIES

    Industry 4.0, Vol. 2 (2017), Issue 1, pg(s) 17-20

    The adoption of new technologies in organizations requires a preliminary assessment of risks, pro and cons of the planned change (SWOT analysis and change management). This paper acknowledges the important changes which are occurring in the security of the ICT systems in the organizations as a consequence from the transfer to the cloud services.

    Traditionally, IT is positioned behind the firewall of any organization and all servers, virtualized or not, are specific as a service for any business. The authority which supports the security systems could choose the components for security among multiple proved products – firewalls, antivirus systems, servers, updates management, proxy servers, etc. In this way is guaranteed the high level of control upon the security of IT environment and the requirements of different standards for security.