The CloudSocket project, funded under H2020, puts forth the idea of a “hybrid process” modelling framework applying well-known techniques for semantic, rule-based inference, meta modelling and knowledge management techniques to bridge the gap between business needs and the use and exploitation of Cloud resources and components.
DICE action (Developing Data-Intensive Cloud Applications with Iterative Quality Enhancements)  focuses on Big Data, Quality Assurance (QA) and Model-Driven Engineering (MDE).
Recent years have seen the rapid growth of interest for developing enterprise applications that use data-intensive technologies. However, quality assurance in the software engineering process for these applications is still in its infancy.
Internet of Things, Marketplaces, Data Streaming, Cloud Computing, Data Processing, Smart Cities
Market sector targets
Our COMPOSE demo targets IoT Apps developers, IoT Infrastructure Managers and Sensor makers.
For software companies, cloud computing offers a modern world of business opportunity, allowing them to provide their application not only as a product but as a service. Thus, they will enjoy, among other advantages, of agility and efficiency.
Migrating software to cloud infrastructure may be sufficient much of the time. But residing in the cloud is not enough to make an application fully scalable, elastic and ‘cloudy’. The software code itself must be modernized if maximum performance and efficiency are required.
CloudingSMEs takes a comprehensive approach to the use of cloud computing by SMEs, which considers both the supply side (i.e. results and endeavors of ICT SMEs with expertise on cloud computing) and the demand side (i.e. the adoption and use of cloud computing technologies by SMEs).
CloudCatalyst aims to provide useful tools to foster the adoption of cloud computing in Europe. The project will set up a cross-border support service, contributing to strengthening European position in the Cloud Computing market, including the European software industry for both businesses and consumers.
Okeanos  is an IaaS cloud service developed and operated by GRNET . The service is powered by Synnefo , an open source software build on top of existing proven open source software (Google Ganeti, Ceph, etc.) which has been expanded in-house in order to provide a robust and complete IaaS cloud solution.
EDUCLOUD is the first “School as a Service” platform available in a French state school today.
Following the theme of making learning fun for children, NVIDIA has been working with Gayatech, other start-up companies, and local authorities, on a customisable cloud-based educational platform which includes a 3D video game for children as its main pillar.
The G-Cloud, which launched in 2012, essentially provides an online Digital Marketplace where public organisations can find different services offered by a large amount of suppliers that are part of the G-Cloud Framework Agreement. The G-Cloud has definitely had an impact on the way the UK public sector buys commodity IT services and the government has been commended on the strides it has taken to refine the procurement and certification process through the G-Cloud.
Cloud-based business is becoming the backbone of the European economy and society. Many services are based on the Cloud and several businesses and critical infrastructures are becoming increasingly dependent on it.
Overall, the speed of change in Cloud technologies and services continues to be impressive and the main transformation is driven by the Trusted Cloud and Big Data integration as visible in the Future Cloud high impact initiative: Trusted Cloud.
Addressing key concerns impeding the mainstream adoption of the cloud: privacy, security, trust
Cyber attacks are increasing in velocity and intensity, potentially undermining or at least slowing down the development of cloud applications. 90% of companies worldwide recognize they are insufficiently prepared to protect themselves against them. The level of sophistication of cyber attacks is increasing too, showing at least three different ways of using the cyber weapon: