{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T18:02:29Z","timestamp":1761242549155,"version":"build-2065373602"},"reference-count":41,"publisher":"IBM","issue":"1","funder":[{"name":"IBM Streams team"},{"DOI":"10.13039\/100025305","name":"IBM Research","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100025305","id-type":"DOI","asserted-by":"crossref"}]},{"name":"IBM Streams network processing operator, and machine learning experiment"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IBM J. Res. &amp; Dev."],"published-print":{"date-parts":[[2017,1,1]]},"DOI":"10.1147\/jrd.2016.2626858","type":"journal-article","created":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T01:01:23Z","timestamp":1489539683000},"page":"1:5-1:16","source":"Crossref","is-referenced-by-count":1,"title":["End-to-end service data analysis: Efficiencies achieved across the enterprise"],"prefix":"10.1147","volume":"61","author":[{"given":"L. M.","family":"Herger","sequence":"first","affiliation":[]},{"given":"W. J.","family":"Rippon","sequence":"additional","affiliation":[]},{"given":"C. A.","family":"Fonseca","sequence":"additional","affiliation":[]},{"given":"W.","family":"Pointer","sequence":"additional","affiliation":[]},{"given":"B. M.","family":"Belgodere","sequence":"additional","affiliation":[]},{"given":"W. H.","family":"Cornejo","sequence":"additional","affiliation":[]},{"given":"M. J.","family":"Frissora","sequence":"additional","affiliation":[]}],"member":"3082","reference":[{"year":"0","key":"ref39"},{"year":"0","key":"ref38","article-title":"JFrog artifactory"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.02.033"},{"year":"0","key":"ref32","article-title":"IBM bluemix"},{"year":"0","key":"ref31","article-title":"IBM bluemix"},{"year":"0","key":"ref30","article-title":"2014 Cloud Adoption Survey"},{"year":"0","key":"ref37"},{"year":"0","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145396"},{"journal-title":"Building a DevOps Culture","year":"2013","author":"walls","key":"ref34"},{"article-title":"Computing,\n cognition and the future of knowing&#x2014; How humans and machines are forging new understanding","year":"0","author":"kelly","key":"ref10"},{"year":"0","key":"ref40"},{"year":"0","key":"ref11","article-title":"IBM BigFix."},{"key":"ref12","first-page":"1060","article-title":"Benefits and\n challenges of managing heterogeneous data centers","author":"hwang","year":"0","journal-title":"Proc 2013 IFIP\/IEEE Int Symp Integr Netw Manage"},{"year":"0","key":"ref13","article-title":"IBM cognos analytics"},{"year":"0","key":"ref14","article-title":"IBM QRadar."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RADIOELEK.2015.7128982"},{"year":"0","key":"ref16","article-title":"IBM SiteProtector"},{"year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2270"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.52"},{"article-title":"Thoughts on cloud","year":"0","author":"hossain","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2009.5340029"},{"year":"0","key":"ref27","article-title":"IBM cloud marketplace business partner program overview"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICMTMA.2014.52"},{"year":"2015","key":"ref6","article-title":"2015 cost of cyber crime study"},{"year":"2014","key":"ref29","article-title":"Enterprise cloud adoption survey 2014: Summary results"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"year":"2014","key":"ref8","article-title":"2014 data breach investigations report"},{"year":"2015","key":"ref7","article-title":"2015 data breach investigations report"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.313.0590"},{"article-title":"Biggest data breaches of 2015","year":"2015","author":"greene","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.263.0276"},{"journal-title":"The Policy Driven Data Center with ACI Architecture Concepts and Methodology","year":"2014","author":"avramov","key":"ref20"},{"year":"0","key":"ref22","article-title":"IBM streams"},{"article-title":"The forrester wave: Big data predictive analytics solutions, Q2 2015","year":"2015","author":"gualtieri","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2013.6755060"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.119"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"year":"0","key":"ref26","article-title":"IBM SoftLayer"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"}],"container-title":["IBM Journal of Research and Development"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5288520\/7875214\/07877285.pdf?arnumber=7877285","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T17:57:36Z","timestamp":1761242256000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7877285\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,1]]},"references-count":41,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1147\/jrd.2016.2626858","relation":{},"ISSN":["0018-8646","0018-8646"],"issn-type":[{"type":"print","value":"0018-8646"},{"type":"electronic","value":"0018-8646"}],"subject":[],"published":{"date-parts":[[2017,1,1]]}}}