4,275 research outputs found

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Geoarchaeological Investigations of Late Pleistocene Physical Environments and Impacts of Prehistoric Foragers on the Ecosystem in Northern Malawi and Austria

    Get PDF
    A growing body of research shows that not only did environmental changes play an important role in human evolution, but humans in turn have impacted ecosystems and landscape evolution since the Late Pleistocene. This thesis presents collaborative work on Late Pleistocene open-air sites in the Karonga District of northern Malawi, in which new aspects of forager behavior came to light through the reconstruction of physical environments. My work has helped recognize that late Middle Stone Age (MSA) activity and tool production occurred in locally more open riparian environments within evergreen gallery forest, surrounded by a regional vegetation dominated by miombo woodlands and savanna. Additionally, MSA hunter-gatherers exploited the confluence of river and wetland areas along the shores of Lake Malawi, which likely served as important corridors for the dispersal of biota. By comparing data from the archaeological investigations with lake core records, we were able to identify effects of anthropogenic burning on vegetation structures and sedimentation in the region as early as 80 thousand years ago. These findings not only proved it possible to uncover early impacts of human activity on the ecosystem, but also emphasize the importance of fire in the lives of early foragers. Publications contained within this dissertation: A. Wright, D.K., Thompson, J.C., Schilt, F.C., Cohen, A., Choi, J-H., Mercader, J., Nightingale, S., Miller, C.E., Mentzer, S.M., Walde, D., Welling, M., and Gomani-Chindebvu, E. “Approaches to Middle Stone Age landscape archaeology in tropical Africa”. Special issue Geoarchaeology of the Tropics of Journal of Archaeological Science 77:64-77. http://dx.doi.org/10.1016/j.jas.2016.01.014 B. Schilt, F.C., Verpoorte, A., Antl, W. “Micromorphology of an Upper Paleolithic cultural layer at Grub-Kranawetberg, Austria”. Journal of Archaeological Science: Reports 14:152-162. http://dx.doi.org/10.1016/j.jasrep.2017.05.041 C. Nightingale, S., Schilt, F.C., Thompson, J.C., Wright, D.K., Forman, S., Mercader, J., Moss, P., Clarke, S. Itambu, M., Gomani-Chindebvu, E., Welling, M. Late Middle Stone Age Behavior and Environments at Chaminade I (Karonga, Malawi). Journal of Paleolithic Archaeology 2-3:258-397. https://doi.org/10.1007/s41982-019-00035-3 D. Thompson, J.C.*, Wright, D.K.*, Ivory, S.J.*, Choi, J-H., Nightingale, S., Mackay, A., Schilt, F.C., Otárola-Castillo, E., Mercader, J., Forman, S.L., Pietsch, T., Cohen, A.S., Arrowsmith, J.R., Welling, M., Davis, J., Schiery, B., Kaliba, P., Malijani, O., Blome, M.W., O’Driscoll, C., Mentzer, S.M., Miller, C., Heo, S., Choi, J., Tembo, J., Mapemba, F., Simengwa, D., and Gomani-Chindebvu, E. “Early human impacts and ecosystem reorganization in southern-central Africa”. Science Advances 7(19): eabf9776. *equal contribution https://doi.org/10.1126/sciadv.abf9776 E. Schilt, F.C., Miller, C.M., Wright, D.K., Mentzer, S.M., Mercader, J., Moss, Choi, J.-H., Siljedal, G., Clarke, S., Mwambwiga, A., Thomas, K., Barbieri, A., Kaliba, P., Gomani-Chindebvu, E., Thompson, J.C. “Hunter-gatherer environments at the Late Pleistocene sites of Bruce and Mwanganda´s Village, northern Malawi”. Quaternary Science Reviews 292: 107638. https://www.sciencedirect.com/science/article/pii/S0277379122002694 [untranslated

    Innovation in Energy Security and Long-Term Energy Efficiency â…ˇ

    Get PDF
    The sustainable development of our planet depends on the use of energy. The increasing world population inevitably causes an increase in the demand for energy, which, on the one hand, threatens us with the potential to encounter a shortage of energy supply, and, on the other hand, causes the deterioration of the environment. Therefore, our task is to reduce this demand through different innovative solutions (i.e., both technological and social). Social marketing and economic policies can also play their role by affecting the behavior of households and companies and by causing behavioral change oriented to energy stewardship, with an overall switch to renewable energy resources. This reprint provides a platform for the exchange of a wide range of ideas, which, ultimately, would facilitate driving societies toward long-term energy efficiency

    Comparing the Performance of Initial Coin Offerings to Crowdfunded Equity Ventures

    Get PDF
    Uncertainty in markets increases the likelihood of market failure due to volatility and suboptimal functioning. While initial coin offerings (ICOs) and crowdfunded equity (CFE) offerings may improve functioning in growing markets, there is a lack of knowledge and understanding pertaining to the relative efficiency and behavior of ICO markets compared to CFE markets, potentially perpetuating and thwarting the various communities they are intended to serve. The purpose of this correlational study was to compare a group of ICOs with a group of CFE offerings to identify predictive factors of funding outcomes related to both capital offering types. Efficient market hypothesis was the study’s theoretical foundation, and analysis of variance was used to answer the research question, which examined whether capital offering type predicted the amount of funds raised while controlling for access to the offering companies’ secondary control factors: historical financial data, pro forma financial projections, detailed product descriptions, video of product demonstrations, company website, company history, company leadership, and company investors. Relying on a random sample of 115 campaigns (84 ICOs and 31 CFE) from websites ICOdrops.com, localstake.com, fundable.com, and mainvest.com, results showed differences in mean funds raised between CFEs and ICOs (346,075comparedto346,075 compared to 4,756,464, respectively). ANOVA results showed no single secondary control factors and only one two-factor interaction (company leadership and company investors) influenced mean funds raised. This study may contribute to positive social change by informing best practices among market participants including entrepreneurs, regulators, scholars, and investors

    Reshaping Higher Education for a Post-COVID-19 World: Lessons Learned and Moving Forward

    Get PDF
    No abstract available

    Tradition and Innovation in Construction Project Management

    Get PDF
    This book is a reprint of the Special Issue 'Tradition and Innovation in Construction Project Management' that was published in the journal Buildings

    Current issues of the management of socio-economic systems in terms of globalization challenges

    Get PDF
    The authors of the scientific monograph have come to the conclusion that the management of socio-economic systems in the terms of global challenges requires the use of mechanisms to ensure security, optimise the use of resource potential, increase competitiveness, and provide state support to economic entities. Basic research focuses on assessment of economic entities in the terms of global challenges, analysis of the financial system, migration flows, logistics and product exports, territorial development. The research results have been implemented in the different decision-making models in the context of global challenges, strategic planning, financial and food security, education management, information technology and innovation. The results of the study can be used in the developing of directions, programmes and strategies for sustainable development of economic entities and regions, increasing the competitiveness of products and services, decision-making at the level of ministries and agencies that regulate the processes of managing socio-economic systems. The results can also be used by students and young scientists in the educational process and conducting scientific research on the management of socio-economic systems in the terms of global challenges

    QoS-aware architectures, technologies, and middleware for the cloud continuum

    Get PDF
    The recent trend of moving Cloud Computing capabilities to the Edge of the network is reshaping how applications and their middleware supports are designed, deployed, and operated. This new model envisions a continuum of virtual resources between the traditional cloud and the network edge, which is potentially more suitable to meet the heterogeneous Quality of Service (QoS) requirements of diverse application domains and next-generation applications. Several classes of advanced Internet of Things (IoT) applications, e.g., in the industrial manufacturing domain, are expected to serve a wide range of applications with heterogeneous QoS requirements and call for QoS management systems to guarantee/control performance indicators, even in the presence of real-world factors such as limited bandwidth and concurrent virtual resource utilization. The present dissertation proposes a comprehensive QoS-aware architecture that addresses the challenges of integrating cloud infrastructure with edge nodes in IoT applications. The architecture provides end-to-end QoS support by incorporating several components for managing physical and virtual resources. The proposed architecture features: i) a multilevel middleware for resolving the convergence between Operational Technology (OT) and Information Technology (IT), ii) an end-to-end QoS management approach compliant with the Time-Sensitive Networking (TSN) standard, iii) new approaches for virtualized network environments, such as running TSN-based applications under Ultra-low Latency (ULL) constraints in virtual and 5G environments, and iv) an accelerated and deterministic container overlay network architecture. Additionally, the QoS-aware architecture includes two novel middlewares: i) a middleware that transparently integrates multiple acceleration technologies in heterogeneous Edge contexts and ii) a QoS-aware middleware for Serverless platforms that leverages coordination of various QoS mechanisms and virtualized Function-as-a-Service (FaaS) invocation stack to manage end-to-end QoS metrics. Finally, all architecture components were tested and evaluated by leveraging realistic testbeds, demonstrating the efficacy of the proposed solutions
    • …
    corecore