50,972 research outputs found

    Dynamic Physiological Partitioning on a Shared-nothing Database Cluster

    Full text link
    Traditional DBMS servers are usually over-provisioned for most of their daily workloads and, because they do not show good-enough energy proportionality, waste a lot of energy while underutilized. A cluster of small (wimpy) servers, where its size can be dynamically adjusted to the current workload, offers better energy characteristics for these workloads. Yet, data migration, necessary to balance utilization among the nodes, is a non-trivial and time-consuming task that may consume the energy saved. For this reason, a sophisticated and easy to adjust partitioning scheme fostering dynamic reorganization is needed. In this paper, we adapt a technique originally created for SMP systems, called physiological partitioning, to distribute data among nodes, that allows to easily repartition data without interrupting transactions. We dynamically partition DB tables based on the nodes' utilization and given energy constraints and compare our approach with physical partitioning and logical partitioning methods. To quantify possible energy saving and its conceivable drawback on query runtimes, we evaluate our implementation on an experimental cluster and compare the results w.r.t. performance and energy consumption. Depending on the workload, we can substantially save energy without sacrificing too much performance

    Influencing interaction: Development of the design with intent method

    Get PDF
    Persuasive Technology has the potential to influence user behavior for social benefit, e.g. to reduce environmental impact, but designers are lacking guidance choosing among design techniques for influencing interaction. The Design with Intent Method, a ‘suggestion tool’ addressing this problem, is introduced in this paper, and applied to the briefs of reducing unnecessary household lighting use, and improving the efficiency of printing, primarily to evaluate the method’s usability and guide the direction of its development. The trial demonstrates that the DwI Method is quick to apply and leads to a range of relevant design concepts. With development, the DwI Method could be a useful tool for designers working on influencing user behavior

    TrusNet: Peer-to-Peer Cryptographic Authentication

    Get PDF
    Originally, the Internet was meant as a general purpose communication protocol, transferring primarily text documents between interested parties. Over time, documents expanded to include pictures, videos and even web pages. Increasingly, the Internet is being used to transfer a new kind of data which it was never designed for. In most ways, this new data type fits in naturally to the Internet, taking advantage of the near limit-less expanse of the protocol. Hardware protocols, unlike previous data types, provide a unique set security problem. Much like financial data, hardware protocols extended across the Internet must be protected with authentication. Currently, systems which do authenticate do so through a central server, utilizing a similar authentication model to the HTTPS protocol. This hierarchical model is often at odds with the needs of hardware protocols, particularly in ad-hoc networks where peer-to-peer communication is prioritized over a hierarchical model. Our project attempts to implement a peer-to-peer cryptographic authentication protocol to be used to protect hardware protocols extending over the Internet. The TrusNet project uses public-key cryptography to authenticate nodes on a distributed network, with each node locally managing a record of the public keys of nodes which it has encountered. These keys are used to secure data transmission between nodes and to authenticate the identities of nodes. TrusNet is designed to be used on multiple different types of network interfaces, but currently only has explicit hooks for Internet Protocol connections. As of June 2016, TrusNet has successfully achieved a basic authentication and communication protocol on Windows 7, OSX, Linux 14 and the Intel Edison. TrusNet uses RC-4 as its stream cipher and RSA as its public-key algorithm, although both of these are easily configurable. Along with the library, TrusNet also enables the building of a unit testing suite, a simple UI application designed to visualize the basics of the system and a build with hooks into the I/O pins of the Intel Edison allowing for a basic demonstration of the system

    Innovative public governance through cloud computing: Information privacy, business models and performance measurement challenges

    Get PDF
    Purpose: The purpose of this paper is to identify and analyze challenges and to discuss proposed solutions for innovative public governance through cloud computing. Innovative technologies, such as federation of services and cloud computing, can greatly contribute to the provision of e-government services, through scaleable and flexible systems. Furthermore, they can facilitate in reducing costs and overcoming public information segmentation. Nonetheless, when public agencies use these technologies, they encounter several associated organizational and technical changes, as well as significant challenges. Design/methodology/approach: We followed a multidisciplinary perspective (social, behavioral, business and technical) and conducted a conceptual analysis for analyzing the associated challenges. We conducted focus group interviews in two countries for evaluating the performance models that resulted from the conceptual analysis. Findings: This study identifies and analyzes several challenges that may emerge while adopting innovative technologies for public governance and e-government services. Furthermore, it presents suggested solutions deriving from the experience of designing a related platform for public governance, including issues of privacy requirements, proposed business models and key performance indicators for public services on cloud computing. Research limitations/implications: The challenges and solutions discussed are based on the experience gained by designing one platform. However, we rely on issues and challenges collected from four countries. Practical implications: The identification of challenges for innovative design of e-government services through a central portal in Europe and using service federation is expected to inform practitioners in different roles about significant changes across multiple levels that are implied and may accelerate the challenges' resolution. Originality/value: This is the first study that discusses from multiple perspectives and through empirical investigation the challenges to realize public governance through innovative technologies. The results emerge from an actual portal that will function at a European level. © Emerald Group Publishing Limited

    Design of a Microgravity Hybrid Inflatable Airlock

    Get PDF
    Spacewalks, or extra-vehicular activities (EVAs), are a critical component of human space exploration for science activities and habitat construction and maintenance. For NASA's proposed lunar Gateway system, an airlock module is required for vehicle maintenance, repair, and exploration. Traditional airlock structures are fully metallic, with two chambers, known as an equipment lock and a crew lock. The larger volume, called the equipment lock, serves as the storage, logistics and electronics area, while the smaller volume, called the crew lock, serves as the volume to transition from the vacuum of space to the pressurized cabin. A traditional metallic structure design offers mass efficiency for these elements, but cannot offer volume efficiency. The potential to use an inflatable fabric pressure shell supplemented by a metallic support structure allows for efficiency in both mass and volume. Inflatable structures are being used for human habitable space modules, starting with the Bigelow Expandable Activities Module on the International Space Station. They are high-strength fabric-based structures that are compactly stowed for launch and then, once in space, they are expanded and rigidized with internal pressure. They provide significant launch volume savings over metallic structures. For Gateway, a hybrid airlock design is proposed with both metallic and inflatable structural elements, taking advantage of each material's capabilities. A metallic equipment lock serves as both a docking node and provides pressurized volume for pre-EVA activities including pre-breathe and suit donning/doffing. A rigid equipment lock offers stowage space during launch for integrated hardware and suits. Adding an integrated inflatable crew lock provides the volume required for EVAs with minimal use of launch volume. Using dual inflatable crew locks provides redundancy and the capability to move large pieces of equipment into and out of the vehicle for repair and maintenance. The inflatable crew lock is deflated and packaged in the launch shroud and expanded after installation on the Gateway. This packing capability allows additional volume to be added to the equipment lock and fully utilize the capability of the launch vehicle. This report outlines the work completed to design, analyze, and test the systems of a microgravity airlock with inflatable crew locks. In detail, it includes launch vehicles, structural sizing of the metallic equipment lock, the fabric layers of the inflatable crew lock, the internal structure of the crew lock, the space suit interface elements, the crew restraint system, the hatches and pass-throughs, the material and thermal elements, and the crew operations for the usage of the system. This paper is meant to offer a reference design for a hybrid microgravity airlock design for deep space human exploration
    • …
    corecore