517 research outputs found
A programmable architecture for the provision of hybrid services
The success of new service provision platforms will largely depend on their ability to blend with existing technologies. The advent of Internet telephony, although impressive, is unlikely to make telephone customers suddenly turn in favor of computers. Rather, customers display increasing interest in services that span multiple networks (especially Internet Protocol-based networks and the telephone and cellular networks) and open new vistas. We refer to these services as hybrid services and propose an architecture for their provision. This architecture allows for programming the service platform elements (i.e., network nodes, gateways, control servers, and terminals) in order to include new service logics. We identify components that can be assembled to build these logics by considering a service as a composition of features such as address translation, security, call control, connectivity, charging and user interaction. Generic service components are derived from the modeling of these features. We assure that our proposal can be implemented even in existing systems in return for slight changes: These systems are required to generate an event when a special service is encountered. The treatment of this event is handled by an object at a Java Service Layer. Java has been chosen for its platform-neutrality feature and its embedded security mechanisms. Using our architecture, we design a hybrid closed user group service
A systems thinking approach to business intelligence solutions based on cloud computing
Thesis (S.M. in System Design and Management)--Massachusetts Institute of Technology, Engineering Systems Division, 2010.Cataloged from PDF version of thesis.Includes bibliographical references (p. 73-74).Business intelligence is the set of tools, processes, practices and people that are used to take advantage of information to support decision making in the organizations. Cloud computing is a new paradigm for offering computing resources that work on demand, are scalable and are charged by the time they are used. Organizations can save large amounts of money and effort using this approach. This document identifies the main challenges companies encounter while working on business intelligence applications in the cloud, such as security, availability, performance, integration, regulatory issues, and constraints on network bandwidth. All these challenges are addressed with a systems thinking approach, and several solutions are offered that can be applied according to the organization's needs. An evaluations of the main vendors of cloud computing technology is presented, so that business intelligence developers identify the available tools and companies they can depend on to migrate or build applications in the cloud. It is demonstrated how business intelligence applications can increase their availability with a cloud computing approach, by decreasing the mean time to recovery (handled by the cloud service provider) and increasing the mean time to failure (achieved by the introduction of more redundancy on the hardware). Innovative mechanisms are discussed in order to improve cloud applications, such as private, public and hybrid clouds, column-oriented databases, in-memory databases and the Data Warehouse 2.0 architecture. Finally, it is shown how the project management for a business intelligence application can be facilitated with a cloud computing approach. Design structure matrices are dramatically simplified by avoiding unnecessary iterations while sizing, validating, and testing hardware and software resources.by Eumir P. Reyes.S.M.in System Design and Managemen
NetGlance NMS - An integrated network monitoring system
Mestrado de dupla diplomação com a Kuban State Agrarian UniversityThis work is about IT infrastructure and, in particular, computer networks in KubSAU
and IPB. Also, it is about a network monitoring system “NetGlance NMS” developed for
KubSAU System Administration Department.
Work objective is to optimize the information structure for KubSAU and IPB.
During the work, following tasks were completed: Research the existing IPB information
structure, Compare the information structure for KubSAU and IPB, Model the IPB
computer network (topology, services), Research bottlenecks and potential pitfalls in the
data-center and in the computer network of IPB, Research information security mechanisms
in the computer network of IPB, Organize monitoring process for the computer
network in KubSAU.
The most important impact of the work is an increasing network productivity and user
experience as a result of creation and deploy a monitoring software.O trabalho descrito no âmbito desta dissertação incide sobre a infraestrutura TI e, em
particular, sobre as redes de computadores da KubSAU e do IPB. Além disso, descreve-se
um sistema de gestão integrada de redes, designada “NetGlance NMS”, desenvolvido para
o Departamento de Administração de Sistemas da KubSAU.
O objetivo do trabalho é desenvolver uma ferramenta para otimizar a gestão da estrutura
de comunicações das duas instituições.
Durante o trabalho, as seguintes tarefas foram concluídas: levantamento da estrutura
de comunicações do IPB, comparação da estrutura de comunicações entre a KubSAU e o
IPB, modelação da rede de comunicações do IPB (topologia, serviços), estudo de possíveis
estrangulamentos no datacenter e na rede de comunicações doIPB, estudo de mecanismos
de segurança na rede de comunicações do IPB, organização do processo de monitorização
da rede de comunicações da KubSAU.
O contributo mais relevante deste trabalho é o desenvolvimento de uma aplicação de
gestão integrada de redes, de forma a contribuir para o aumento da produtividade da rede
e da experiência dos utilizadores
McNair Scholars Research Journal Volume VI
https://commons.stmarytx.edu/msrj/1005/thumbnail.jp
McNair Scholars Research Journal Volume VI
https://commons.stmarytx.edu/msrj/1005/thumbnail.jp
Computers Can’t Get Wet: Queer Slippage and Play in the Rhetoric of Computational Structure
This dissertation takes up the argument that computers are rhetorical structures that can be queered. Using cross-disciplinary methods, it examines the interplay that occurs between the layers of the computational stack – focusing in particular on the slippage between materiality, code, interface, and the resulting software – and analyzes the narratives that each layer perpetuates individually and in tandem. It applies a multi-faceted approach to queer theory in order to reveal the ways in which anti-normative computer users critique, resist, and subvert these narratives. When computers are approached as always already queer, the possibilities for disruption that exist within their limits materialize and present themselves as opportunities for intersectional exploitation. Praxis is at the heart of this project. In it, the author strives to interact with, build, and embody the technology that also serves as the object of study
Recommended from our members
Policy based network management : state of the industry and desired functionality for the enterprise network: security policy / testing technology evaluation.
Policy-based network management (PBNM) uses policy-driven automation to manage complex enterprise and service provider networks. Such management is strongly supported by industry standards, state of the art technologies and vendor product offerings. We present a case for the use of PBNM and related technologies for end-to-end service delivery. We provide a definition of PBNM terms, a discussion of how such management should function and the current state of the industry. We include recommendations for continued work that would allow for PBNM to be put in place over the next five years in the unclassified environment
Managing law practice technology
Presented by Barron K. Henley, at a seminar by the same name, held November 17, 2020
- …