16,068 research outputs found

    Microservices: Granularity vs. Performance

    Full text link
    Microservice Architectures (MA) have the potential to increase the agility of software development. In an era where businesses require software applications to evolve to support software emerging requirements, particularly for Internet of Things (IoT) applications, we examine the issue of microservice granularity and explore its effect upon application latency. Two approaches to microservice deployment are simulated; the first with microservices in a single container, and the second with microservices partitioned across separate containers. We observed a neglibible increase in service latency for the multiple container deployment over a single container.Comment: 6 pages, conferenc

    Cloud Security : A Review of Recent Threats and Solution Models

    Get PDF
    The most significant barrier to the wide adoption of cloud services has been attributed to perceived cloud insecurity (Smitha, Anna and Dan, 2012). In an attempt to review this subject, this paper will explore some of the major security threats to the cloud and the security models employed in tackling them. Access control violations, message integrity violations, data leakages, inability to guarantee complete data deletion, code injection, malwares and lack of expertise in cloud technology rank the major threats. The European Union invested €3m in City University London to research into the certification of Cloud security services. This and more recent developments are significant in addressing increasing public concerns regarding the confidentiality, integrity and privacy of data held in cloud environments. Some of the current cloud security models adopted in addressing cloud security threats were – Encryption of all data at storage and during transmission. The Cisco IronPort S-Series web security appliance was among security solutions to solve cloud access control issues. 2-factor Authentication with RSA SecurID and close monitoring appeared to be the most popular solutions to authentication and access control issues in the cloud. Database Active Monitoring, File Active Monitoring, URL Filters and Data Loss Prevention were solutions for detecting and preventing unauthorised data migration into and within clouds. There is yet no guarantee for a complete deletion of data by cloud providers on client requests however; FADE may be a solution (Yang et al., 2012)

    An Application of Multimedia Services on Transportation: The Use of the World Wide Web (WWW)

    Get PDF
    INTRODUCTION In recent years, there is an ever-increasing demand and interest in the use of multimedia technology and applications in industry, government and academia. Multimedia is often seen by researchers as the next step forward in interfacing science, technology and community. Yet, the terminology of multimedia bears several meanings. It may refer to Compact Disc (CD), moving pictures or video-conferencing. The multimedia technology referred in this paper is the World Wide Web (WWW) hypertext publishing information system which was developed by and started at the European Laboratory for Particle Physics (CERN) in Geneva, Switzerland. Since the introduction of WWW, its use has increased dramatically within a couple of years in a widely diverse community including government departments, university and research establishments, and commercial organisations. It has significant influence to our communities and our daily lives. Yet, in most cases, applications of WWW services are largely restricted to electronic library referencelcatalogue search facilities, electronic mail systems, electronic conference and discussion systems, electronic news and publishing agents, and remote access to computing resources on the Internet. The primary objective of this paper is to exploit the potential of this multimedia technology as a simple, easy-to-use and effective means of telematics application in transportation research. It is hoped that initiatives are highlighted via this study and hence encourage participations and collaborations from different sectors of industries. In this paper, a brief history of WWW is given in section (2). An overview of the technical aspects in providing a WWW service is presented in section (3) in terms of computer hardware requirements, software installation, network connections, application maintenance and administration, and system security. Compared to most commercially available multimedia software in the market, WWW services are cheap to run, userfriendly and readily available to the public on the Internet. In order to exploit the potential of WWW on transportation research, a study was carried out and results of the findings are reported in section (4). To further substantiate the level of usefulness, two particular WWW applications were chosen amongst other web services and they are reported in section (5) for illustrative purposes. The selected applications are the 'Transportation Resources on the Internet' developed in mid-1994 in the Institute for Transport Studies (ITS) at the University of Leeds in England, and the 'Southern California Real-Time Traffic Report' developed by Maxwell Laboratories, Inc. in collaboration with the California State Department of Transportation in the US. Finally, a set of issues are raised in section (6), highlighting the directions of future development of WWW as an easy-touse, cheap and effective multimedia telematics application on transportation

    An Approach to Ad hoc Cloud Computing

    Get PDF
    We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provision involves a data center model, in which clusters of machines are dedicated to running cloud infrastructure software. We propose an additional model, the ad hoc cloud, in which infrastructure software is distributed over resources harvested from machines already in existence within an enterprise. In contrast to the data center cloud model, resource levels are not established a priori, nor are resources dedicated exclusively to the cloud while in use. A participating machine is not dedicated to the cloud, but has some other primary purpose such as running interactive processes for a particular user. We outline the major implementation challenges and one approach to tackling them

    The role of information systems in the prevention and detection of transnational and international crime

    Get PDF
    © Cambridge University Press 2014. All around the world criminal activity remains at the forefront of governmental concerns, not only as a problem that distorts the very fabric of society within the confines of national jurisdictions, but also as a problem that cuts across national borders to exhibit a global dimension. The international dimension of criminal activity remains critical and is generally characterized by a complexity that is unique and requires action on many different levels. Criminals set out to mask their illegal activities and deliberately generate complexity as a means of concealment. In doing so, they exploit new developments in technology that assist them in achieving their ends. This criminality exhibits forms of innovation that stretch far beyond traditional criminal activity (e.g., drug and human trafficking) and manages to attach itself within the broader fabric of society by exploiting the very latest developments. This evolution is necessary as criminals seek not only to escape arrest, prosecution and conviction, but also to enjoy the fruits of their criminality (mostly financial gains). Thus, they seek to develop ways of exploiting the various diffuse norms of social interaction (e.g., trust), financial modes of conduct (e.g., cash-based economies), technological and communication developments (e.g., Internet), and thereby minimize the possibility for detection. By limiting the resources that can be made available for prevention (or making them obsolete when developing new criminal behaviour), they participate in this co-evolution actively; and this they achieve by generating complexity

    The Atomic Manifesto: a Story in Four Quarks

    Get PDF
    This report summarizes the viewpoints and insights gathered in the Dagstuhl Seminar on Atomicity in System Design and Execution, which was attended by 32 people from four different scientific communities: database and transaction processing systems, fault tolerance and dependable systems, formal methods for system design and correctness reasoning, and hardware architecture and programming languages. Each community presents its position in interpreting the notion of atomicity and the existing state of the art, and each community identifies scientific challenges that should be addressed in future work. In addition, the report discusses common themes across communities and strategic research problems that require multiple communities to team up for a viable solution. The general theme of how to specify, implement, compose, and reason about extended and relaxed notions of atomicity is viewed as a key piece in coping with the pressing issue of building and maintaining highly dependable systems that comprise many components with complex interaction patterns
    • …
    corecore