47,500 research outputs found

    Cloud Storage Performance and Security Analysis with Hadoop and GridFTP

    Get PDF
    Even though cloud server has been around for a few years, most of the web hosts today have not converted to cloud yet. If the purpose of the cloud server is distributing and storing files on the internet, FTP servers were much earlier than the cloud. FTP server is sufficient to distribute content on the internet. Therefore, is it worth to shift from FTP server to cloud server? The cloud storage provider declares high durability and availability for their users, and the ability to scale up for more storage space easily could save users tons of money. However, does it provide higher performance and better security features? Hadoop is a very popular platform for cloud computing. It is free software under Apache License. It is written in Java and supports large data processing in a distributed environment. Characteristics of Hadoop include partitioning of data, computing across thousands of hosts, and executing application computations in parallel. Hadoop Distributed File System allows rapid data transfer up to thousands of terabytes, and is capable of operating even in the case of node failure. GridFTP supports high-speed data transfer for wide-area networks. It is based on the FTP and features multiple data channels for parallel transfers. This report describes the technology behind HDFS and enhancement to the Hadoop security features with Kerberos. Based on data transfer performance and security features of HDFS and GridFTP server, we can decide if we should replace GridFTP server with HDFS. According to our experiment result, we conclude that GridFTP server provides better throughput than HDFS, and Kerberos has minimal impact to HDFS performance. We proposed a solution which users authenticate with HDFS first, and get the file from HDFS server to the client using GridFTP

    Політика безпеки web-застосувань та серверів

    Get PDF
    Petrov K.E., Kobzev I.V. and Onishchenko Y.M. (2015), “Security policy of web-applications and server”, [“Polityka bezpeky web-zastosuvan ta serveriv”], Visnyk Kharkivskoho Natsionalnoho Universytetu Vnutrishnikh Sprav, No. 2, pp. 256-263.Петров, К. Е. Політика безпеки web-застосувань та серверів / К. Е. Петров, І. В Кобзев, Ю. М. Онищенко // Вісник Харківського національного університету внутрішніх справ. - 2015. - № 2 (69). - С. 256-263.Розглянуто питання вразливості використання Web-застосувань та серверів і яким чином можуть бути використані найбільш загальні способи захисту для запобігання програмним атакам на сервери та застосування. Функціонування Web-сервера неможливе, якщо не приділяти належну увагу питанням забезпечення його інформаційної безпеки. Ця проблема може бути вирішена шляхом використання комплексного підходу до захисту ресурсів сервера від можливих атак.Today the security breaches in Web-applications, same like before, remains one of significant shortcomings in maintaining the information security. Probably, one of the main reasons of low level of security for many Web-applications is negligence and underestimation of risk gravity for information security breaches with integrated Web-applications, which are in free access in Internet. In the article the most common protection means are discussed, and organizations may adopt such practices for attack prevention on servers or easing the negative consequences. In the first place for correct organization of Web-server protection there are needs to find out the weak points in Web-applications and Web-server’s security policy. Performance of such audit allows reveal faults and evaluate the level of Webapplication protection, as well produce the set of recommendations in security enhancement. Regardless the measures taken, that aimed on providing of Web-server security, the probability of intrusion can’t be completely excluded. Therefore, if that security breach happened, it is important to minimize the attack outcome. One of the successful solutions of this task is the users’ privileges distribution, when concrete user is granted rights to run certain programs. Nowadays, the normal functioning of Web-server, connected to Internet is practically impossible, if do not pay due attention to its information security maintenance. This problem can be solved by utilization of complex approaches in server resources protection from possible threats. In order to solve this problem such approaches should include systems of antivirus protection, integrity checks, intrusions detection, access rights division, cryptography protection and sub-system of control.Рассмотрены вопросы уязвимости использования Web-приложений и серверов, а также каким образом могут быть использованы наиболее общие способы защиты для предотвращения программных атак на серверы и приложения. Функционирование Web-сервера невозможно, если не уделять надлежащее внимание вопросам обеспечения его информационной безопасности. Эта проблема может быть решена путём использования комплексного подхода к защите ресурсов сервера от возможных атак

    Islamic Economy Through Online Community (IEOC) Issues on Information Gathering & Storing

    Get PDF
    Knowledge Communities are communities of interest that come together to share knowledge that affects performance. Knowledge Management envisions getting the right information within the right context to the right person at the right time for the right business purpose. Communities are more aware and concern of sharing and transfer the knowledge. The rapid development of web technology had made the World Wide Web an important and popular application platform for disseminating and searching for information as well as conducting business. As a huge source, World Wide Web has allowed unprecedented sharing of ideas and information on a scale never seen before. The use of Web and its exponential growth are now well known, and they are causing a revolution in the way people use computers and perform daily tasks. Therefore Islamic Economy thru Online Community [IEOC] intention was to proposed for an avenue of knowledge sharing and experience for the community. Issue on Information Gathering and Storing is discussed in this project paper where it concentrates on how data are being managed and used. The target users of this website are among consumers and business personnel. In developing the project, the methodology comprises of four ( 4) phase: System Planning and Strategy , System Analysis and Design , System Implementation and System Testing. The tools used comprises of Macromedia Dreamweaver MX 2004, Joomla Open Source, Apache Web Server and PHP scripting language. In the end of this paper, conclusion and recommendation part will discuss for future enhancement. ii

    HELIN Consortium OPAC Report

    Get PDF
    Report of the HELIN OPAC Task Force, a group appointed by the HELIN Directors to review the Innovative Interfaces online public access catalog under 2006 release driven by WebPAC Pro. The task force met during the fall of 2006

    Single cell analysis of neutrophils NETs by Microscopic LSPR imaging system

    Get PDF
    A simple microengraving cell monitoring method for neutrophil extracellular traps (NETs) released from single neutrophils has been realized using a polydimethylsiloxane (PDMS) microwell array (MWA) sheet on a plasmon chip platform. An imbalance between NETs formation and the succeeding degradation (NETosis) are considered associated with autoimmune disease and its pathogenesis. Thus, an alternative platform that can conduct monitoring of this activity on single cell level at minimum cost but with great sensitivity is greatly desired. The developed MWA plasmon chips allow single cell isolation of neutrophils from 150 μL suspension (6.0 × 105 cells/mL) with an efficiency of 36.3%; 105 microwells with single cell condition. To demonstrate the utility of the chip, trapped cells were incubated between 2 to 4 h after introducing with 100 nM phorbol 12- myristate 13-acetate (PMA) before measurement. Under observation using a hyperspectral imaging system that allows high-throughput screening, the neutrophils stimulated by PMA solution show a significant release of fibrils and NETs after 4 h, with observed maximum areas between 314–758 μm2. An average absorption peak wavelength shows a redshift of Δλ = 1.5 nm as neutrophils release NETs

    Context-driven progressive enhancement of mobile web applications: a multicriteria decision-making approach

    Get PDF
    Personal computing has become all about mobile and embedded devices. As a result, the adoption rate of smartphones is rapidly increasing and this trend has set a need for mobile applications to be available at anytime, anywhere and on any device. Despite the obvious advantages of such immersive mobile applications, software developers are increasingly facing the challenges related to device fragmentation. Current application development solutions are insufficiently prepared for handling the enormous variety of software platforms and hardware characteristics covering the mobile eco-system. As a result, maintaining a viable balance between development costs and market coverage has turned out to be a challenging issue when developing mobile applications. This article proposes a context-aware software platform for the development and delivery of self-adaptive mobile applications over the Web. An adaptive application composition approach is introduced, capable of autonomously bypassing context-related fragmentation issues. This goal is achieved by incorporating and validating the concept of fine-grained progressive application enhancements based on a multicriteria decision-making strategy
    corecore