Figure 2 - uploaded by Jason Ryan Thompson
Content may be subject to copyright.
Image from Kotka et al. (2016) showing the three components of the Data Embassy Initiative

Image from Kotka et al. (2016) showing the three components of the Data Embassy Initiative

Source publication
Thesis
Full-text available
The definition of how contemporary statehood is defined has evolved throughout the centuries since its inception during the Peace of Westphalia. The interweaving between modern governments and technology along with developments like the Estonian Data Embassy Initiative shows that this evolution is continuing today. In many states around the world,...

Contexts in source publication

Context 1
... plans, called the Data Embassy Initiative, would allow Estonia to solve its current fragmentation problems as well as set a course for a more stable & secure future e-state "without borders" ( Kotka et al. 2016, p. 103-104). The Data Embassy Initiative consists of three elements that make up the whole system (see Figure 2): the domestic Estonian Government Cloud that would run the live services offered by the Estonian e-government, backup copies of public Government Cloud data and government services operated from clouds run by the private sector, and backup copies of the entire Estonian e-government in Estonian embassies around the world and in dedicated physical data embassies in allied countries (p. 104). ...
Context 2
... E-Government A diagram of the final version of the Bakatian E-Government designed and implemented by the Ministry of Technology is shown in Figure 12. Three ministries were eventually closed due to their reliance on a territorial government. ...
Context 3
... remaining ministries were tasked to convert their services to a digital form and to integrate into the Ministry of Technology's digital authentication infrastructure. Figure 12 Diagram of the Bakatian E-Government structure linking Cabinet offices to the services they provide ...

Similar publications

Article
Full-text available
A cloud data center provides various facilities such as storage, data accessibility, and running many specific applications on cloud resources. The unpredictable demand for service requests in cloud workloads affects the availability of resources during scheduling. It raises the issues of inaccurate workload prediction, lack of fulfillment in resou...
Chapter
Full-text available
This paper makes a practical comparison between serverfull and serverless architectures for the same specific cloud application used for face recognition. It turns out that both approaches have advantages and disadvantages and their specific use needs to be carefully assessed in the design phase of the software life cycle.
Article
Full-text available
The article is devoted to the topical issue of the cloud technologies implementation in educational process in general and when studying geography, in particular. The authors offer a selection of online services which can contribute to the effective acquisition of geographical knowledge in higher school. The publication describes such cloud technol...
Article
Full-text available
In order to better solve the ambiguity and uncertainty in the evaluation indicators of college students' physical literacy, the cloud model method is used to evaluate college students' physical literacy ability, and the evaluation system is constructed by combining the first and second level indicators such as sports cognition, sports ability and s...