775,514 research outputs found

    MAGNET: A Virtual Shared Tuplespace Resource Manager

    Get PDF
    Traditional operating systems limit flexibility, performance and utilization of hardware resources by forcing applications to use inappropriate high-level abstractions, uniform protection schemes and high-level static resource management. This forced use of inappropriate services results in poor application and operating system performance. A radical new approach to operating systems design and construction is needed to meet the requirements of modern applications. Within our Centre, we are designing BITS: the Component Based Operating System, to address these issues.To realize its full potential, BITS requires a radically new resource management strategy. The operating system design gives an environment for implementing extensions, but a resource manager module is responsible for making them available. It allows system services to be specialized, replaced or extended to better serve application-specific needs.In this paper we propose the MAGNET Resource Manager enabling a free-market negotiation of application requests and server resources. It provides an additional level of flexibility for application participation in resource management. MAGNET also provides a platform for an additional runtime level of extensibility: dynamic modification and replacement of its parts during execution

    Dynamic Resource Management in a Static Network Operating System

    Get PDF
    We present novel approaches to managing three key resources in an event-driven sensornet OS: memory, energy, and peripherals. We describe the factors that necessitate using these new approaches rather than existing ones. A combination of static allocation and compile-time virtualization isolates resources from one another, while dynamic management provides the flexibility and sharing needed to minimize worst-case overheads. We evaluate the effectiveness and efficiency of these management policies in comparison to those of TinyOS 1.x, SOS, MOS, and Contiki. We show that by making memory, energy, and peripherals first-class abstractions, an OS can quickly, efficiently, and accurately adjust itself to the lowest possible power state, enable high performance applications when active, prevent memory corruption with little RAM overhead, and be flexible enough to support a broad range of devices and uses

    BAG : Managing GPU as buffer cache in operating systems

    Get PDF
    This paper presents the design, implementation and evaluation of BAG, a system that manages GPU as the buffer cache in operating systems. Unlike previous uses of GPUs, which have focused on the computational capabilities of GPUs, BAG is designed to explore a new dimension in managing GPUs in heterogeneous systems where the GPU memory is an exploitable but always ignored resource. With the carefully designed data structures and algorithms, such as concurrent hashtable, log-structured data store for the management of GPU memory, and highly-parallel GPU kernels for garbage collection, BAG achieves good performance under various workloads. In addition, leveraging the existing abstraction of the operating system not only makes the implementation of BAG non-intrusive, but also facilitates the system deployment

    A Comparative Study of the Software Packages Used as HRIS by Organizations Operating in India: Human Resource Professionals’ Perspective.

    Get PDF
    The aim of the study was to do a comparative study to find the various software packages of human resource information system (HRIS) used by organizations operating in India. In this era of information explosion, in a developing country like India , human resources should be managed well and to do so, an integration of technology with the day today activities of employees should be the prime focus of organizations, operating in any domain. In the human resource management domain the technological solution is the implementation and use of human resource information system, which has in the last couple of decades become one of the most important pillar of modern human resource management. Thus for this study, a total of 71 companies across India were shortlisted across six different sectors namely information technology, real estate, business process outsourcing, financial services, manpower consulting and travel & tourism. The sample size of 385 respondents was decided, but only 355 questionnaires were found to be usable and were thus analyzed, which is a response rate of 96.25%. Chi-square results showed that organizations in the real estate sector and the service sector of India, differed significantly on the software packages  being used as human resource information system (HRIS) by organizations operating in India. This study also provided concrete insight about human resource professionals, perspective about the various features of human resource information system (HRIS) that the organization is currently using. Research Type: Research Paper Keywords: Human Resource Information System, Human resource Management, HRIS Software, Features of Human Resource Information System, India

    Containers : A Sound Basis For a True Single System Image

    Get PDF
    Clusters of SMPs are attractive for executing shared memory parallel applications but reconciling high performance and ease of programming remains an open issue. A possible approach is to provide an efficient Single System Image (SSI) operating system giving the illusion of an SMP machine. In this paper, we introduce the concept of container as a mechanism to unify global resource management at the lowest operating system level. Higher level operating system services such as virtual memory system and file cache can be easily implemented based on containers and transparently take benefit of the whole memory resource available in the cluster

    A Hierarchical Framework of Cloud Resource Allocation and Power Management Using Deep Reinforcement Learning

    Full text link
    Automatic decision-making approaches, such as reinforcement learning (RL), have been applied to (partially) solve the resource allocation problem adaptively in the cloud computing system. However, a complete cloud resource allocation framework exhibits high dimensions in state and action spaces, which prohibit the usefulness of traditional RL techniques. In addition, high power consumption has become one of the critical concerns in design and control of cloud computing systems, which degrades system reliability and increases cooling cost. An effective dynamic power management (DPM) policy should minimize power consumption while maintaining performance degradation within an acceptable level. Thus, a joint virtual machine (VM) resource allocation and power management framework is critical to the overall cloud computing system. Moreover, novel solution framework is necessary to address the even higher dimensions in state and action spaces. In this paper, we propose a novel hierarchical framework for solving the overall resource allocation and power management problem in cloud computing systems. The proposed hierarchical framework comprises a global tier for VM resource allocation to the servers and a local tier for distributed power management of local servers. The emerging deep reinforcement learning (DRL) technique, which can deal with complicated control problems with large state space, is adopted to solve the global tier problem. Furthermore, an autoencoder and a novel weight sharing structure are adopted to handle the high-dimensional state space and accelerate the convergence speed. On the other hand, the local tier of distributed server power managements comprises an LSTM based workload predictor and a model-free RL based power manager, operating in a distributed manner.Comment: accepted by 37th IEEE International Conference on Distributed Computing (ICDCS 2017

    ORACLE DATABASE SECURITY

    Get PDF
    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user accounts that require a login password to be authenticated to access the data.data security, password administration, Oracle HTTP Server, OracleAS, access control
    • 

    corecore