9,474 research outputs found

    Deep Space Network information system architecture study

    Get PDF
    The purpose of this article is to describe an architecture for the Deep Space Network (DSN) information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990s. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies, such as the following: computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control

    09201 Abstracts Collection -- Self-Healing and Self-Adaptive Systems

    Get PDF
    From May 10th 2009 to May 15th 2009 the Dagstuhl Seminar 09201 ``Self-Healing and Self-Adaptive Systems\u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open problems were discussed. Abstracts of the presentations given during the seminar are put together in this paper. Links to extended abstracts or full papers are provided, if available. A description of the seminar topics, goals and results in general can be found in a separate document ``Executive Summary\u27\u27

    Disaster Recovery Management with PowerShell PSDRM

    Get PDF
    Securing information and infrastructure is at the top of every organization’s priority. Security solutions are necessary and when properly implemented can minimize the exposure of an organization’s risk to compromise. Implementation can be costly and standardization is challenging. There are many cybersecurity solutions available ranging from open source to premium level coverages that can include deployment, monitoring, detection, and response. As threats evolve, the impacts of exploits become more difficult to thwart and in cases of ransomware the affects can immobilize a company and lead to lasting economic reprisal. Disaster Recovery provides an aspect of Cybersecurity and the most fundamental requirement for an organization to maintain continuity. When an organization publicly acknowledges compromise of their infrastructure regardless of the nature of the attack, the outfall is loss of confidence which inevitably impacts both internal and external stakeholders. This in turn leads to further efficiency loss to the businesses profitability as the primary resources are allocated to investigative and resolution matters. What this research\u27s primary goal is to focus on Disaster Recovery and provide an executable with PowerShell at the backend to perform a selective approach to automating Disaster Recovery within Virtualization infrastructures. This research shows methods on which an administrator could build their project using native tools such as PowerShell, to provide their own customized automated Disaster Recovery solutions designed for Virtualized environments by initiating a backup, test, restore and conserve volatile state. Too often does an organization lack the necessary skillsets needed to bring an organization back to service after an attack as much has seen in the effect of Ransomware attacks. Providing these means for organizations gives those with less than a financial advantage a fighting chance against unanticipated attacks. We accomplish this by standardizing a method for the roles responsible in the organization for ensuring security measures are maintained using PowerShell

    Enhanced Model To Minimize Future Downtime Case Study Of Malaysia Cloud Providers Towards Near-Zero Downtime

    Get PDF
    In providing tremendous access to data and computing power of thousands of commodity servers, large-scale cloud systems must address a new challenge: they must detect and recover from a growing number of failures, in both hardware and software components. The growing complexity of technology scaling, manufacturing, design logic, usage, and operating environment increases the occurrence of failures. Unfortunately, downtime handling has proven to be problematic in today’s cloud systems. The downtime recovery path is often complex, under-specified, and tested less frequently than the normal path. As indicated by recent cloud outage incidents, existing large-scale cloud systems are still fragile and error-prone. The purpose of this study to identify the issues causing cloud downtime, to investigate the recovery ability of the database during cloud downtime and to propose enhanced model that can be used to minimize the future downtime

    Click-UP: Toward the Software Upgrade of Click-Based Modular Network Function

    Get PDF

    Virtualisation and Thin Client : A Survey of Virtual Desktop environments

    Get PDF
    This survey examines some of the leading commercial Virtualisation and Thin Client technologies. Reference is made to a number of academic research sources and to prominent industry specialists and commentators. A basic virtualisation Laboratory model is assembled to demonstrate fundamental Thin Client operations and to clarify potential problem areas

    Cloud Ready Desktop Virtualization Solution

    Get PDF
    Cloud computing is a relatively new set of technologies that can allow businesses to easily scale their computing resources and improve responsiveness to customer needs. This has held true for application, server, and desktop virtualization. Desktop virtualization in particular provides a means to solve many of the traditional challenges associated with deploying and maintaining large business workstation environments, including centralized data management, rapid deployment of workstations, and centralized updating. VMware, a longtime leader in the virtualization sector, offers a desktop virtualization platform that is widely considered to be the best in class. This paper explores the process of building a desktop virtualization solution using VMware View, a cloud-ready desktop virtualization solution from VMware
    • …
    corecore