The first newsletter from the ClouT project provides an overall view on the project’s concept and its first results. ClouT, which stands for “cloud of things”, is providing infrastructure, services, tools and applications that will be used by municipalities, citizens, service developers and application integrators to create, deploy and manage applications that take advantage of the latest advances in the Internet of Things (IoT) and Cloud domains.
The value of the cloud lies in developing new applications and the agility that comes with that. Cloud computing provides speed to market for businesses. The future is being able to manage diverse platforms. Businesses should not be told that they have to move onto a certain platform. Businesses should be helped to make informed decisions on how to manage diverse platforms. Mobile and social networks are driving this change, drastically shortening the time it takes to develop applications.
Contribute to and define the future research priorities in the areas of Cloud Computing and Software, ahead of the H2020 ICT Work Programme 2016-17. DG Connect (Unit E2) has launched a web-based Public Consultation and invite all interested stakeholders (industry, research centres, academia, SMEs and users) to contribute.
Join the debate here and have your say!
This workshop is jointly organised by the units CNECT/E2 ("Software and Services, Cloud") and E4 ("Experimental Platforms") of Directorate-General for Communications Networks, Content and Technology (DG CONNECT) in order to gather inputs from the FIRE and Cloud Computing communities.
GENiC – Globally optimised ENergy effIcient data Centres is a framework 7 program under the objective ICT-2013.6.2 Data Centres in an energy-efficient and environmentally friendly Internet.
Results from the GENiC project will provide opportunities to expand portfolios for industry and stakeholders alike.
SERSCIS developed a layered semantic modelling approach that can be adapted to any domain, and allows security experts and system designers to insert their knowledge, e.g. the security experts define generic assets, security threats and controls, while the system designer models their own system via intuitive and easy to use graphical user interfaces.