7,152 research outputs found

    Configuration Management of Distributed Systems over Unreliable and Hostile Networks

    Get PDF
    Economic incentives of large criminal profits and the threat of legal consequences have pushed criminals to continuously improve their malware, especially command and control channels. This thesis applied concepts from successful malware command and control to explore the survivability and resilience of benign configuration management systems. This work expands on existing stage models of malware life cycle to contribute a new model for identifying malware concepts applicable to benign configuration management. The Hidden Master architecture is a contribution to master-agent network communication. In the Hidden Master architecture, communication between master and agent is asynchronous and can operate trough intermediate nodes. This protects the master secret key, which gives full control of all computers participating in configuration management. Multiple improvements to idempotent configuration were proposed, including the definition of the minimal base resource dependency model, simplified resource revalidation and the use of imperative general purpose language for defining idempotent configuration. Following the constructive research approach, the improvements to configuration management were designed into two prototypes. This allowed validation in laboratory testing, in two case studies and in expert interviews. In laboratory testing, the Hidden Master prototype was more resilient than leading configuration management tools in high load and low memory conditions, and against packet loss and corruption. Only the research prototype was adaptable to a network without stable topology due to the asynchronous nature of the Hidden Master architecture. The main case study used the research prototype in a complex environment to deploy a multi-room, authenticated audiovisual system for a client of an organization deploying the configuration. The case studies indicated that imperative general purpose language can be used for idempotent configuration in real life, for defining new configurations in unexpected situations using the base resources, and abstracting those using standard language features; and that such a system seems easy to learn. Potential business benefits were identified and evaluated using individual semistructured expert interviews. Respondents agreed that the models and the Hidden Master architecture could reduce costs and risks, improve developer productivity and allow faster time-to-market. Protection of master secret keys and the reduced need for incident response were seen as key drivers for improved security. Low-cost geographic scaling and leveraging file serving capabilities of commodity servers were seen to improve scaling and resiliency. Respondents identified jurisdictional legal limitations to encryption and requirements for cloud operator auditing as factors potentially limiting the full use of some concepts

    UMSL Bulletin 2023-2024

    Get PDF
    The 2023-2024 Bulletin and Course Catalog for the University of Missouri St. Louis.https://irl.umsl.edu/bulletin/1088/thumbnail.jp

    Graduate Catalog of Studies, 2023-2024

    Get PDF

    Derogatory, Racist, and Discriminatory Speech (DRDS) in Video Gaming

    Get PDF
    Video games have been examined for their effects on cognition, learning, health, and physiological arousal, yet research on social dynamics within video gaming is limited. Studies have documented the presence of derogation, racism, and discrimination in this anonymous medium. However, gamers‟ firsthand experiences are typically examined qualitatively. Thus, this study aimed to establish a quantitative baseline for the frequency of derogatory, racist, and discriminatory speech (DRDS) in gaming. DRDS frequency, sexual harassment, and hate speech measures were administered to 150 individuals from online forums and social media groups. Descriptive and inferential analyses were used to gauge which factors affected DRDS rates. Sex, intergroup and fast-paced game types, time played with others, and identity portrayal showed positive correlations with DRDS. Results indicate an array of complex social and developmental factors contribute to experiencing, perceiving, and personally using DRDS. Implications include psychosocial health impacts similar to everyday harassment, with women being at a higher risk and age as a contributing factor

    A Phenomenological Study Exploring the Factors That Contribute to Persistence in Online Doctoral Programs for Students With Learning Disabilities or ADHD

    Get PDF
    The purpose of this transcendental phenomenological study was to discover the factors that contributed to persistence in online doctoral programs for students with learning disabilities (LD) and attention deficit hyperactivity disorder (ADHD). The theory guiding this study was Tinto’s theory of student persistence, as it suggested the more students were academically and socially integrated into their institution, the more likely they were to persist in their studies. The Central research question of this study is, “What are the factors that contribute to persistence in online doctoral programs for students with LD and ADHD?” Participants in this study consisted of seven individuals with learning disabilities or ADHD who had completed all of their required coursework in their current online doctoral program and had started the dissertation phase of their program, and four who had graduated from their online doctoral programs within the last two years. Candidates were selected using purposive sampling. Perspectives of students with LD and ADHD as they related to their academic persistence were shared. The lived experiences of online doctoral students with LD and ADHD were studied using online discussion board prompts, individual interviews, and focus groups. The data were collected and analyzed using Moustakas’ transcendental phenomenology approach and generated six themes and commonalities among the participants in this study. The themes were Overcoming Challenges and Barriers, Adaptation and Coping Strategies, Motivation, Self-Efficacy, Support Systems, and Personal Determination and Perseverance. The data analysis revealed empirical, practical, and theoretical implications along with recommendations for future research

    Online TeleHealth of Mind-body Interventions Versus Face-to-Face Counseling and the Health-related Quality of Life in Women with Polycystic Ovary Syndrome: A Randomized Clinical Trial

    Get PDF
    Background & aim: Limited studies have been conducted on the effectiveness, applicability, and satisfaction of mind-body interventions as short-term methods that affect body conditions like Polycystic Ovary Syndrome (PCOS). Therefore, this study aimed to compare the efficacy of online mind-body interventions versus face-to-face counseling on the quality of life (QOL) of women with PCOS.Methods: This parallel randomized clinical trial was implemented in Yazd in 2020.  Sixty eligible women with PCOS were randomly allocated to the online group (n=30) and face-to-face counseling (n=30) groups. Eight 120-minute sessions of mind-body interventions were held for both groups, either as online or face-to face. Data was collected using the PCOS Health-Related Quality of Life (HRQOL) questionnaire (at baseline, week 8 and 12), counseling satisfaction scale (at week 8 and 12), and FBS (at baseline and week 8) in both groups. Data were analyzed by SPSS (version22) using T-test, and repeated measures ANOVA.Results:  HRQOL was 94.87±11.75 in online and 90.50±9.76 in face-to-face group at baseline, which increased significantly to 108.53±4.5 in the online and face-to-face groups at week 12, with a greater increase in the online group (P<0.001). Satisfaction with counseling increased at week 12 compared to week 8 in both groups, which was not significantly different (P=0.31). FBS decreased at week 8 compared to baseline in both groups without a significant difference (P=0.26).Conclusion: The greater effectiveness of online mind-body interventions on HRQOL in women with PCOS highlights their potential value as telehealth interventions

    Modern computing: Vision and challenges

    Get PDF
    Over the past six decades, the computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as the Internet and the commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving and adapting to cover multifaceted societal niches. This has led to new paradigms such as cloud, fog, edge computing, and the Internet of Things (IoT), which offer fresh economic and creative opportunities. Nevertheless, this rapid change poses complex research challenges, especially in maximizing potential and enhancing functionality. As such, to maintain an economical level of performance that meets ever-tighter requirements, one must understand the drivers of new model emergence and expansion, and how contemporary challenges differ from past ones. To that end, this article investigates and assesses the factors influencing the evolution of computing systems, covering established systems and architectures as well as newer developments, such as serverless computing, quantum computing, and on-device AI on edge devices. Trends emerge when one traces technological trajectory, which includes the rapid obsolescence of frameworks due to business and technical constraints, a move towards specialized systems and models, and varying approaches to centralized and decentralized control. This comprehensive review of modern computing systems looks ahead to the future of research in the field, highlighting key challenges and emerging trends, and underscoring their importance in cost-effectively driving technological progress
    • …
    corecore