Parameter Calibration, Customer Load Balancing and Security Aspects for Multiplexing of BPO Infrastructure
نویسنده
چکیده
Outsourcing, during its establishment phase, focused on the socio-economic and the managerial concerns of the companies, countries and people involved. As we progress toward the next generation of outsourcing, we need to ascertain a technology framework that would permit us to outsource in a secure and optimized manner with reduced reliance on litigations approach. This paper discusses Business Processing Outsourcing (BPO) infrastructure from the parallel and distributed computing perspective. Multiplexing of BPO infrastructure using Customer Interface Array (CIA), is organized as a distributed environment across various service centers to minimize delays, maximize efficiency and improve customer satisfaction. Three primary parametersCustomer Satisfaction Rate (CSR), Cyber Crime Index (CCI) and Civil Infrastructure Status (CIS) take into account various social, economical, cultural and geographical aspects of BPO operations in which the service centers are located. The paper discusses a Fuzzy Logic based methodology for customer load balancing across the various service centers. This algorithm is for deployment at the level of the Inter-Dialoguing Processor (IDP), which is used as a resource for facilitating communication between the CIA and the various service centers. IDP is useful to establish context-awareness in BPO environment. The paper brings out the possibility of new hardware add-on cards with associated software development specifically tailored for BPO and IT outsourcing activities. Index-Terms: BPO, Outsourcing, Parallel and Distributed Processing, Fuzzy Logic, Performance Evaluation, Middleware Resource Management, Service Composition, Multicasting in Networks, Sourcing Governance Requirements
منابع مشابه
Online Distribution and Load Balancing Optimization Using the Robin Hood and Johnson Hybrid Algorithm
Proper planning of assembly lines is one of the production managers’ concerns at the tactical level so that it would be possible to use the machine capacity, reduce operating costs and deliver customer orders on time. The lack of an efficient method in balancing assembly line can create threatening problems for manufacturing organizations. The use of assembly line balancing methods cannot balan...
متن کاملCloud Partitioning Based Secured Load balancing Approach for Public Cloud Infrastructure
There has been a great significance of dynamic load balancing strategies for public cloud infrastructures (PCIs). An optimized load balancing strategy can enhance the performance of PCIs many folds. The predominant requirements for optimal public cloud are the efficient resource utilization and data security. On the other hand the dynamic load scheduling can make cloud system operational effici...
متن کاملLoad Balancing Approaches for Web Servers: A Survey of Recent Trends
Numerous works has been done for load balancing of web servers in grid environment. Reason behinds popularity of grid environment is to allow accessing distributed resources which are located at remote locations. For effective utilization, load must be balanced among all resources. Importance of load balancing is discussed by distinguishing the system between without load balancing and with loa...
متن کاملAntecedents and Performance Outcomes of Onshore and Offshore BPO
While firms increasingly utilize business process outsourcing (BPO) to manage operations and achieve strategic objectives, there is limited research on the implications for firms and consumers. This dissertation begins to address these implications by studying antecedents and performance outcomes of onshore and offshore BPO. The first chapter studies factors that enable firms to outsource busin...
متن کاملPolicy-Sealed Data: A New Abstraction for Building Trusted Cloud Services
Accidental or intentional mismanagement of cloud software by administrators poses a serious threat to the integrity and confidentiality of customer data hosted by cloud services. Trusted computing provides an important foundation for designing cloud services that are more resilient to these threats. However, current trusted computing technology is ill-suited to the cloud as it exposes too many ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007