1,387 research outputs found

    User's and Administrator's Manual of AMGA Metadata Catalog v 2.4.0 (EMI-3)

    Get PDF
    User's and Administrator's Manual of AMGA Metadata Catalog v 2.4.0 (EMI-3

    Intermediate File Servers in a Distributed File System Environment

    Full text link
    A component of the Institutional File System (IFS), the intermediate file server addresses scaling and interoperability issues on the University of Michigan campus. The IFS is based on AFS, a distributed file system from Transarc. Intermediate servers provide protocol translation that enables non-AFS clients to easily access the distributed file system. For example, Macintosh users can manipulate UNIX files that reside on a server by moving folders and icons, just as they would manipulate local Macintosh files. Intermediate servers also offer other benefits, such as multi-level caching and data preloading, that increase the capacity of the network by reducing the load on central servers.http://deepblue.lib.umich.edu/bitstream/2027.42/107959/1/citi-tr-92-4.pd

    XMPP for cloud computing in bioinformatics supporting discovery and invocation of asynchronous web services

    Get PDF
    Background: Life sciences make heavily use of the web for both data provision and analysis. However, the increasing amount of available data and the diversity of analysis tools call for machine accessible interfaces in order to be effective. HTTP-based Web service technologies, like the Simple Object Access Protocol (SOAP) and REpresentational State Transfer (REST) services, are today the most common technologies for this in bioinformatics. However, these methods have severe drawbacks, including lack of discoverability, and the inability for services to send status notifications. Several complementary workarounds have been proposed, but the results are ad-hoc solutions of varying quality that can be difficult to use. Results: We present a novel approach based on the open standard Extensible Messaging and Presence Protocol (XMPP), consisting of an extension (IO Data) to comprise discovery, asynchronous invocation, and definition of data types in the service. That XMPP cloud services are capable of asynchronous communication implies that clients do not have to poll repetitively for status, but the service sends the results back to the client upon completion. Implementations for Bioclipse and Taverna are presented, as are various XMPP cloud services in bio- and cheminformatics. Conclusion: XMPP with its extensions is a powerful protocol for cloud services that demonstrate several advantages over traditional HTTP-based Web services: 1) services are discoverable without the need of an external registry, 2) asynchronous invocation eliminates the need for ad-hoc solutions like polling, and 3) input and output types defined in the service allows for generation of clients on the fly without the need of an external semantics description. The many advantages over existing technologies make XMPP a highly interesting candidate for next generation online services in bioinformatics

    Establishing, Implementing and Auditing Linux Operating System Hardening Standard for Security Compliance

    Get PDF
    Regulatsioonid loovad väljakutseid ettevõtetele, sest nad peavad igal aastal turvavastavuseks täitma turvastandardeid. Turvastandardite mitte järgimine teeb ettevõtted küberohtudele haavatavaks. Antud magistritöö pakub lahenduse, et täita ettevõtte operatsioonisüsteemi tugevdamise nõudeid luues, implementeerides ja auditeerides Linux (Debian) operatsioonisüsteemi tugevdamise turvastandardit. Magistritöö käsitleb tugevdatud virtuaalmasina tõmmise ehitamist Microsoft Azure pilveplatvormile, mis vastab operatsioonisüsteemi tugevdamise standardile. Kuna lihtsalt ettevõtte turvavastavuse nõuete täitmine ei ole piisav, siis tuleb tagada selle auditeeritavus, et turvavastavuse täitmist audiitoritele tõestada. Antud magistritöös on koostatud lahendus, mis automaatselt auditeerib operatsioonisüsteemi tugevdamise standardit ja võimaldab kinnitada erinevusi standardi ja tegelike virtuaalmasinate konfiguratsioonide vahel. Autor on analüüsinud virtuaalmasinate turvavastavust enne ja pärast uue operatsioonisüsteemi tugevdamise standardi rakendamist.Regulations create challenges to the companies as they must meet tough security standards for security compliance every year. Not following security standards are making companies more vulnerable to cyber threats. This paper provides a proof-of-concept solution for being compliant with operating system hardening requirements of the company by establishing, implementing and auditing Linux (Debian) operating system hardening standard. This work will focus on building a hardened virtual machine image for Microsoft Azure platform that is compliant with the hardening standard that is established in this thesis. As it is not enough to just meet the company security compliance requirements, then there is a need to ensure auditability of it, therefore a proof-of-concept solution is built for automatically auditing the operating system hardening standard that continuously allows to validate the gap between the standard and actual configurations on virtual machines. To demonstrate the result, the author analysed virtual machines compliance state before and after implementing the new operating system hardening standard

    Special Libraries, April 1962

    Get PDF
    Volume 53, Issue 4https://scholarworks.sjsu.edu/sla_sl_1962/1003/thumbnail.jp
    corecore