Parameter Calibration, Customer Load Balancing and Security Aspects for Multiplexing of BPO Infrastructure

نویسنده

  • Tapasya Patki
چکیده

Outsourcing, during its establishment phase, focused on the socio-economic and the managerial concerns of the companies, countries and people involved. As we progress toward the next generation of outsourcing, we need to ascertain a technology framework that would permit us to outsource in a secure and optimized manner with reduced reliance on litigations approach. This paper discusses Business Processing Outsourcing (BPO) infrastructure from the parallel and distributed computing perspective. Multiplexing of BPO infrastructure using Customer Interface Array (CIA), is organized as a distributed environment across various service centers to minimize delays, maximize efficiency and improve customer satisfaction. Three primary parametersCustomer Satisfaction Rate (CSR), Cyber Crime Index (CCI) and Civil Infrastructure Status (CIS) take into account various social, economical, cultural and geographical aspects of BPO operations in which the service centers are located. The paper discusses a Fuzzy Logic based methodology for customer load balancing across the various service centers. This algorithm is for deployment at the level of the Inter-Dialoguing Processor (IDP), which is used as a resource for facilitating communication between the CIA and the various service centers. IDP is useful to establish context-awareness in BPO environment. The paper brings out the possibility of new hardware add-on cards with associated software development specifically tailored for BPO and IT outsourcing activities. Index-Terms: BPO, Outsourcing, Parallel and Distributed Processing, Fuzzy Logic, Performance Evaluation, Middleware Resource Management, Service Composition, Multicasting in Networks, Sourcing Governance Requirements

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Online Distribution and Load Balancing Optimization Using the Robin Hood and Johnson Hybrid Algorithm

Proper planning of assembly lines is one of the production managers’ concerns at the tactical level so that it would be possible to use the machine capacity, reduce operating costs and deliver customer orders on time. The lack of an efficient method in balancing assembly line can create threatening problems for manufacturing organizations. The use of assembly line balancing methods cannot balan...

متن کامل

Cloud Partitioning Based Secured Load balancing Approach for Public Cloud Infrastructure

There has been a great significance of dynamic load balancing strategies for public cloud infrastructures (PCIs). An optimized load balancing strategy can enhance the performance of PCIs many folds. The predominant requirements for optimal public cloud are the efficient resource utilization and data security. On the other hand the dynamic load scheduling can make cloud system operational effici...

متن کامل

Load Balancing Approaches for Web Servers: A Survey of Recent Trends

Numerous works has been done for load balancing of web servers in grid environment. Reason behinds popularity of grid environment is to allow accessing distributed resources which are located at remote locations. For effective utilization, load must be balanced among all resources. Importance of load balancing is discussed by distinguishing the system between without load balancing and with loa...

متن کامل

Antecedents and Performance Outcomes of Onshore and Offshore BPO

While firms increasingly utilize business process outsourcing (BPO) to manage operations and achieve strategic objectives, there is limited research on the implications for firms and consumers. This dissertation begins to address these implications by studying antecedents and performance outcomes of onshore and offshore BPO. The first chapter studies factors that enable firms to outsource busin...

متن کامل

Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services

Accidental or intentional mismanagement of cloud software by administrators poses a serious threat to the integrity and confidentiality of customer data hosted by cloud services. Trusted computing provides an important foundation for designing cloud services that are more resilient to these threats. However, current trusted computing technology is ill-suited to the cloud as it exposes too many ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007