Explore chapters and articles related to this topic
Revealing the Web of Cloud Computing
Published in T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy, Privacy and Security Challenges in Cloud Computing, 2022
M. Satheesh Kumar, Jalel Ben-Othman, B. Sheik Mohamed, A. Shenbagavalli
The concept of cloud in cloud computing is a metaphor for the Internet, similar to how real clouds collect water particles. It is a highly advanced data centre that provides data storage and security, and builds collaboration between employees. While decreasing the cost, it leads to making better decisions and changes the progress of small-scale businesses to large entrepreneurs [1]. The workload is managed by the networks that form the cloud, which is why the workload on the host machine is not too high while running an application. As a result, the user’s demand for software and hardware remains reduced [2]. To make use of cloud storage, all we need is a web browser such as Chrome/Firefox. There are many aspects of cloud computing characteristics that make it one of the fastest growing markets [3].
Modeling Software Vulnerability Correction/Fixation Process Incorporating Time Lag
Published in Adarsh Anand, Mangey Ram, Recent Advancements in Software Reliability Assurance, 2019
J. Kaur, Adarsh Anand, O. Singh
To show the generic nature of the proposed research work, the models have been analyzed on three different types of products: web browser, operating system and application software. The first and second data sets are of vulnerabilities discovered in web browsers. The first data set (DS-I) comprises 1546 vulnerabilities discovered in the web browser Google Chrome between 2008 and 2018. The second data set (DS-II) comprises 1742 vulnerabilities discovered in the web browser Mozilla Firefox between 2003 and 2018. The third and fourth data sets pertain to vulnerabilities detected in operating systems. The third data set (DS-III) comprises 1116 vulnerabilities discovered in the operating system Microsoft Window Server 2008 between 2007 and 2018, and the fourth data set (DS-IV) comprises 2083 vulnerabilities discovered in the operating system Apple Mac OS X between 1999 and 2018. The fifth data set (DS-V) contains 1052 vulnerabilities discovered in the application software Adobe Flash Player between 2005 and 2018.
New Skills for a New Technology
Published in Lionel Felix, Damien Stolarz, Jennifer Jurick, Hands-On Guide to Video Blogging and Podcasting, 2013
Lionel Felix, Damien Stolarz, Jennifer Jurick
The second way that blogs and multimedia blogs are consumed is automatically, by software, through a feed. In this case, a different URL, such as http://www.carhacks.org/podcast/index.xml, provides a clean, uncluttered (to a computer at least) summary of all the pertinent information about the blog feed. All the graphical niceties, the frames, formatting, banners, bells and whistles are absent; just the facts remain. Modern web browsers, such as Internet Explorer 7, Firefox, and Safari are able to view these feeds and display them in all their stark glory. Figure 6-3 shows the XML file for a feed, and Figure 6-4 shows the feed as understood by the Firefox web browser.
From Design Requirements to Effective Privacy Notifications: Empowering Users of Online Services to Make Informed Decisions
Published in International Journal of Human–Computer Interaction, 2021
Patrick Murmann, Farzaneh Karegar
The prototype ran in a standard Firefox web browser on a customary Android phone. It included a start screen, settings (Figure 3Figure 4a), a mock-up of the notification center of the device (Figure 5a–c), and a navigable message display (Figure 5d–f). It implemented typical design concepts and interaction paradigms encountered in today’s apps, such as toggle switches and swipe-able contents. Each of the interaction phases depicted in Figure 2 was functional in terms of being responsive, allowed for navigating back and forth between multiple screens, and provided secondary information upon request. However, the transition between the main phases was not event-driven, which would have been the case for a real-world app operating on the basis of privacy notifications. Instead, each of the interaction phases served as a manual entry point to allow for exploring specific aspects related to our research questions.
Perceived input control on digital platforms: a mixed-methods investigation of web-browser platforms
Published in Journal of Decision Systems, 2021
Evgheni Croitor, Martin Adam, Alexander Benlian
Our empirical setting takes place on Chrome and Firefox, two major web-browser platforms. Both platforms extend their product boundaries by encouraging a large number of developers (i.e. complementors on web browser platforms) to supply extensions (i.e. complements on web browser platforms). Extensions provide add-on functionalities for users, such as ad blocking, privacy protection and search tools. The majority of developers use cross-platform extension development tools (i.e. APIs) and submit their extensions to both platforms at the same time, because the effort of developing an extension is largely independent of the number of platforms that are targeted. Chrome and Firefox offer ideal settings for our empirical analyses for several reasons: First, Chrome and Firefox are typical two-sided platforms with complementors and end-users. Second, to distribute their extensions, developers on both platforms are required to pass through a complementor-related and a complement-related input control process. Third, apart from a registration fee, the input control practices on both platforms are similar, allowing to investigate both platforms from complementors’ perspective at the same time. Finally, extensions from over 150,000 developers are currently available online (ca. 15,900 on Firefox and ca. 189,000 on Chrome). Together, Chrome and Firefox hold over 70% of the browser market worldwide (StatCounter, 2019).
Editorial
Published in Journal of Decision Systems, 2021
David Sammon, Ciara Heavin, Arif Wibisono
This compelling research is a direct response to a call made by Croitor and Benlian (2019) to investigate the effects of perceived input control (PIC) of contributors using web browser platforms such as Chrome and Firefox. Through the lens of IS Continuance theory, the researchers analyse the relationship between a platform’s PIC and the complementors’ decision to keep contributing to a platform. Both quantitative and qualitative data were collected from expert informants, namely web browser extension developers, as part of this study. Results revealed the effects of PIC on complementors’ perceived usefulness, satisfaction, and continuance intentions towards a web browser platform. Further, this article directly contributes to IS control/governance research by characterising the two dimensions of PIC, Complementor-PIC and Complement-PIC.