321 research outputs found

    Small computer system interface (SCSI) universal services for the turbonet parallel computer

    Get PDF
    TurboNet is a parallel computer with shared-memory and message-passing hybrid architecture. It employs two boards, with four digital signal processors (DSPs) each, and a host FORCE SPARC CPU-2CE board with a SCSI bus. Software has been developed in this thesis to provide SCSI services to programs running on the DSPs. DSP programs can therefore fully control assigned SCSI devices at the SCSI command level. Transfer control modifiers ensure compatibility with most SCSI devices. The software provides service for three SCSI access levels. The su SCSI universal device driver is built into the host computer\u27s kernel and is a gateway to the SCSI bus from user contexts. The hscsid SCSI request server daemon is an interrupt driven link between the DSP programs and the su driver. The Hydra SCSI utilities can be included in programs to make SCSI programming easier

    SAM-FS: LSC's New Solaris-Based Storage Management Product

    Get PDF
    SAM-FS is a full featured hierarchical storage management (HSM) device that operates as a file system on Solaris-based machines. The SAM-FS file system provides the user with all of the standard UNIX system utilities and calls, and adds some new commands, i.e. archive, release, stage, sls, sfind, and a family of maintenance commands. The system also offers enhancements such as high performance virtual disk read and write, control of the disk through an extent array, and the ability to dynamically allocate block size. SAM-FS provides 'archive sets' which are groupings of data to be copied to secondary storage. In practice, as soon as a file is written to disk, SAM-FS will make copies onto secondary media. SAM-FS is a scalable storage management system. The system can manage millions of files per system, though this is limited today by the speed of UNIX and its utilities. In the future, a new search algorithm will be implemented that will remove logical and performance restrictions on the number of files managed

    The Litigating States' Proposed Remedy for Microsoft

    Get PDF
    State officials face well-funded, well-organized coalitions of in-state businesses arguing for the prosecution of an out-of-state company, an unequal political contest. Accordingly, the state attorneys general (AGs) have resisted settlement attempts and have pushed both the Justice Department and the courts for stronger action against Microsoft. In the process, the interests of consumers, the AGs' nominal clients, have been paid little more than lip service. The nine litigating states and the District of Columbia together account for just 27 percent of the U. S. population. But they do represent many of Microsoft's most vocal rivals. California is home to Apple, Palm, Oracle, Sun Microsystems, and Netscape. Massachusetts is home to the Lotus division of IBM as well as major operations of Sun and Oracle. Utah is home to Novell. By far, the most overreaching provision in the litigating states' proposal is the prohibition on 'binding' middleware code to Microsoft's operating system software. In short, the litigating states would require Microsoft to allow licensees to remove the software code for any function that a Windows licensee could conceivably single out, while still requiring Microsoft to maintain the performance of the operating system. If Microsoft were able to comply technically, which is far from clear, it would have to rewrite Windows from scratch as a combination of thousands of separable, modular components. This would balkanize Windows as a platform for applications software. Developers would no longer be able to count on the presence of key segments of software code. Indeed, to ensure that their software worked properly, developers would have to provide those features themselves. As a result, consumers would encounter different flavors of Windows with differing capabilities. Adding to Microsoft's (and consumers') woes, the litigating states would require Microsoft to license large amounts of its intellectual property to competitors for little or no compensation. Competitors would get Microsoft's software code for free. But consumers would suffer in the long term from decreased innovation since Microsoft would be left with little incentive to develop Windows or many of its applications programs.Technology and Industry

    Hardening of UNIX Operating System

    Get PDF
    Operating system hardening is the process to address security weaknesses in the operation systems by implementing the latest operating system patches, hot fixes and updates as well as follow up the specific procedures and policies to reduce attacks and system down time

    Information Sharing Solutions for Nato Headquarters

    Get PDF
    NATO is an Alliance of 26 nations that operates on a consensus basis, not a majority basis. Thorough and timely information exchange between nations is fundamental to the Business Process. Current technology and practices at NATO HQ are inadequate to meet modern-day requirements despite the availability of demonstrated and accredited Cross-Domain technology solutions. This lack of integration between networks is getting more complicated with time, as nations continue to invest in IT and ignore the requirements for inter-networked gateways. This contributes to inefficiencies, fostering an atmosphere where shortcuts are taken in order to get the job done. The author recommends that NATO HQ should improve its presence on the Internet, building on the desired tenets of availability and security

    ACRF Data Collection and Processing Infrastructure

    Full text link

    A formal process for the testing of servers

    Get PDF
    Not provided

    Database System Architecture for Fault tolerance and Disaster Recovery

    Get PDF
    Application systems being used today rely heavily on the availability of the database system. Disruption of database system can be damaging and catastrophic to the organization that depends on the availability of the database system for its business and service operations. To ensure business continuity under foreseeable and unforeseeable man-made or natural disasters, the database system has to be designed and built with fault tolerance and disaster recovery capabilities. This project explored existing technologies and solutions to design, build, and implement database system architecture for fault tolerance and disaster recovery using Oracle database software products. The project goal was to implement database system architecture for migrating multiple web applications and databases onto a consolidated system architecture providing high availability database application systems

    A Temporal Logic Based Approach to Multi-Agent Intrusion Detection and Prevention

    Get PDF
    Collaborative systems research in the last decade have led to the development in several areas ranging from social computing, e-learning systems to management of complex computer networks. Intrusion Detection Systems (IDS) available today have a number of problems that limit their configurability, scalability or efficiency. An important shortcoming is that the existing architectures is built around a single entity that does most of the data collection and analysis. This work introduces a new architecture for intrusion detection and prevention based on multiple autonomous agents working collectively. We adopt a temporal logic approach to signature-based intrusion detection. We specify intrusion patterns as formulas in a monitorable logic called EAGLE. We also incorporate logics of knowledge into the agents. We implement a prototype tool, called MIDTL and use this tool to detect a variety of security attacks in large log-files provided by DARPA

    Sun Technologie für Bibliotheken 2005

    Get PDF
    Workshop der Mitarbeiter der EDV-Abteilungen der wissenschaftlichen Bibliotheken in Thüringen am 11. Mai 2005, Ilmena
    corecore