16,068 research outputs found
Microservices: Granularity vs. Performance
Microservice Architectures (MA) have the potential to increase the agility of
software development. In an era where businesses require software applications
to evolve to support software emerging requirements, particularly for Internet
of Things (IoT) applications, we examine the issue of microservice granularity
and explore its effect upon application latency. Two approaches to microservice
deployment are simulated; the first with microservices in a single container,
and the second with microservices partitioned across separate containers. We
observed a neglibible increase in service latency for the multiple container
deployment over a single container.Comment: 6 pages, conferenc
Cloud Security : A Review of Recent Threats and Solution Models
The most significant barrier to the wide adoption of cloud services has been attributed to perceived cloud insecurity (Smitha, Anna and Dan, 2012). In an attempt to review this subject, this paper will explore some of the major security threats to the cloud and the security models employed in tackling them. Access control violations, message integrity violations, data leakages, inability to guarantee complete data deletion, code injection, malwares and lack of expertise in cloud technology rank the major threats. The European Union invested €3m in City University London to research into the certification of Cloud security services. This and more recent developments are significant in addressing increasing public concerns regarding the confidentiality, integrity and privacy of data held in cloud environments. Some of the current cloud security models adopted in addressing cloud security threats were – Encryption of all data at storage and during transmission. The Cisco IronPort S-Series web security appliance was among security solutions to solve cloud access control issues. 2-factor Authentication with RSA SecurID and close monitoring appeared to be the most popular solutions to authentication and access control issues in the cloud. Database Active Monitoring, File Active Monitoring, URL Filters and Data Loss Prevention were solutions for detecting and preventing unauthorised data migration into and within clouds. There is yet no guarantee for a complete deletion of data by cloud providers on client requests however; FADE may be a solution (Yang et al., 2012)
An Application of Multimedia Services on Transportation: The Use of the World Wide Web (WWW)
INTRODUCTION
In recent years, there is an ever-increasing demand and interest in the use of multimedia
technology and applications in industry, government and academia. Multimedia is often
seen by researchers as the next step forward in interfacing science, technology and
community. Yet, the terminology of multimedia bears several meanings. It may refer to
Compact Disc (CD), moving pictures or video-conferencing. The multimedia technology
referred in this paper is the World Wide Web (WWW) hypertext publishing information
system which was developed by and started at the European Laboratory for Particle
Physics (CERN) in Geneva, Switzerland. Since the introduction of WWW, its use has
increased dramatically within a couple of years in a widely diverse community including
government departments, university and research establishments, and commercial
organisations. It has significant influence to our communities and our daily lives. Yet, in
most cases, applications of WWW services are largely restricted to electronic library
referencelcatalogue search facilities, electronic mail systems, electronic conference and
discussion systems, electronic news and publishing agents, and remote access to computing
resources on the Internet.
The primary objective of this paper is to exploit the potential of this multimedia technology
as a simple, easy-to-use and effective means of telematics application in transportation
research. It is hoped that initiatives are highlighted via this study and hence encourage
participations and collaborations from different sectors of industries.
In this paper, a brief history of WWW is given in section (2). An overview of the technical
aspects in providing a WWW service is presented in section (3) in terms of computer
hardware requirements, software installation, network connections, application
maintenance and administration, and system security. Compared to most commercially
available multimedia software in the market, WWW services are cheap to run, userfriendly
and readily available to the public on the Internet. In order to exploit the potential
of WWW on transportation research, a study was carried out and results of the findings are
reported in section (4). To further substantiate the level of usefulness, two particular
WWW applications were chosen amongst other web services and they are reported in
section (5) for illustrative purposes. The selected applications are the 'Transportation
Resources on the Internet' developed in mid-1994 in the Institute for Transport Studies
(ITS) at the University of Leeds in England, and the 'Southern California Real-Time
Traffic Report' developed by Maxwell Laboratories, Inc. in collaboration with the
California State Department of Transportation in the US. Finally, a set of issues are raised
in section (6), highlighting the directions of future development of WWW as an easy-touse,
cheap and effective multimedia telematics application on transportation
An Approach to Ad hoc Cloud Computing
We consider how underused computing resources within an enterprise may be
harnessed to improve utilization and create an elastic computing
infrastructure. Most current cloud provision involves a data center model, in
which clusters of machines are dedicated to running cloud infrastructure
software. We propose an additional model, the ad hoc cloud, in which
infrastructure software is distributed over resources harvested from machines
already in existence within an enterprise. In contrast to the data center cloud
model, resource levels are not established a priori, nor are resources
dedicated exclusively to the cloud while in use. A participating machine is not
dedicated to the cloud, but has some other primary purpose such as running
interactive processes for a particular user. We outline the major
implementation challenges and one approach to tackling them
The role of information systems in the prevention and detection of transnational and international crime
© Cambridge University Press 2014. All around the world criminal activity remains at the forefront of governmental concerns, not only as a problem that distorts the very fabric of society within the confines of national jurisdictions, but also as a problem that cuts across national borders to exhibit a global dimension. The international dimension of criminal activity remains critical and is generally characterized by a complexity that is unique and requires action on many different levels. Criminals set out to mask their illegal activities and deliberately generate complexity as a means of concealment. In doing so, they exploit new developments in technology that assist them in achieving their ends. This criminality exhibits forms of innovation that stretch far beyond traditional criminal activity (e.g., drug and human trafficking) and manages to attach itself within the broader fabric of society by exploiting the very latest developments. This evolution is necessary as criminals seek not only to escape arrest, prosecution and conviction, but also to enjoy the fruits of their criminality (mostly financial gains). Thus, they seek to develop ways of exploiting the various diffuse norms of social interaction (e.g., trust), financial modes of conduct (e.g., cash-based economies), technological and communication developments (e.g., Internet), and thereby minimize the possibility for detection. By limiting the resources that can be made available for prevention (or making them obsolete when developing new criminal behaviour), they participate in this co-evolution actively; and this they achieve by generating complexity
The Atomic Manifesto: a Story in Four Quarks
This report summarizes the viewpoints and insights gathered in the Dagstuhl Seminar on Atomicity in System Design and Execution, which was attended by 32 people from four different scientific communities: database and transaction processing systems, fault tolerance and dependable systems, formal methods for system design and correctness reasoning, and hardware architecture and programming languages. Each community presents its position in interpreting the notion of atomicity and the existing state of the art, and each community identifies scientific challenges that should be addressed in future work. In addition, the report discusses common themes across communities and strategic research problems that require multiple communities to team up for a viable solution.
The general theme of how to specify, implement, compose, and reason about extended
and relaxed notions of atomicity is viewed as a key piece in coping with
the pressing issue of building and maintaining highly dependable systems that
comprise many components with complex interaction patterns
- …