Browsing by Author "Venter, I. M."
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Peer-to-Peer Computing and Grid Computing: Towards a Better Understanding.(The Pacific Journal of Science and Technology, 2011-05) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.; Tiko, Iyamu; Venter, I. M.Currently, both Peer-to-Peer Computing (P2P) and Grid Computing have remained the most vibrant and useful forms of distributed computing all over the world. Their applications are such that they cut across both academia and industry. It has come to the notice of researchers that there are great misunderstanding and misinterpretation on what these forms of distributed computing actually portend and stand for. In this paper therefore, we take a critical look at comparative study of both computing technologies with aim of making readers understand in a clear cut what each really stands for. To have a good comparison, we start by giving a well referenced definition of Grid Computing as well as Peer-toPeer Computing. Also, we used technical issues and general features in our comparison vis-à-vis the architecture, security issue, data movement, application deployment, and operating system requirement. We also considered the strength of both distributed computing system and finally we considered what could be the future of both technologiesItem Statistical interpretations of the turnaround time values for a scalable 3-tier grid-based computing architecture statistical interpretations of the turnaround time values for a scalable 3-tier grid-based computing architecture(GESJ: Computer Science and Telecommunications, 2013) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.; Venter, I. M.; Oyewole, A. S.The concept of scalability for the survival and full-scale implementation as well as efficient utilisation of any distributed system, particularly grid computing, cannot be over-emphasised. It is through this security concept that inter-domain and intra-domain resource sharing, distribution and aggregation can be adequately ensured and guaranteed. This paper is an extension of a paper titled “Towards achieving scalability and interoperability in a triple-domain grid-based environment (3DGBE)” presented at the Information Security for South Africa (ISSA), conference, 2012. The objective of this paper is to provide a comprehensive statistical analysis of the values obtained for the turnaround times for the three domains observed against the number of grid nodes when scalability was being evaluated using ANOVA. Further results obtained also give a summary of the statistical analysis of the values obtained with respects to the three domains vis-à-vis the mean ( , standard deviation and the variance using ANOVA. The essence of the statistical interpretation of these values is to affirm and confirm the significance difference in the mean of group of the three domains considered with respect to variation in the number of grid nodes as well as the number of service requesters as presented.Item Threats to E-Government Implementation in the Civil Service: Nigeria as a Case Study(The Pacific Journal of Science and Technology, 2012) Agbele, Kehinde K.; Azeez, N. A.; Abidoye, A. P.; Adesina, A. O.; Venter, I. M.; Oyewole, A. S.The rapid advancement in Information and Communication Technology (ICT) has undoubtedly influenced positive changes in carrying out administrative functions in government institutions. The ICT adoption rate in Africa is not impressive when compared to the more developed countries of the world. Nigeria, as a case study in this scenario, has also not implemented E-Government impressively, according to the required standards set up by the International Telecommunications Union (ITU). A comprehensive study conducted on the application and implementation of E-Government in Nigeria has provided some metrics that examine the stumbling blocks for realization of adequate and efficient E-Government implementation in the civil service. The research was carried out in the federal civil service in Nigeria in two phases namely, pre-IT implementation phase and post-IT implementation phase. Our findings reveal that ICT implementation will remain elusive in the civil service as long as the as threats explained below remain unaddressed. It has therefore been asserted that the need to overcome these threats is a precondition for realization of E-Government implementation in the federal civil service