Angebote zu "Computing" (19 Treffer)

Kategorien

Shops

Microsoft Azure Active Directory Premium - Abon...
11,60 € *
ggf. zzgl. Versand

Kurzinfo: Microsoft Azure Active Directory Premium - Abonnement-Lizenz (1 Monat) - 1 Benutzer - gehostet - CSP Gruppe Anwendungen Hersteller Microsoft Hersteller Art. Nr. 16c9f982-a827-4003-a88e-e75df1927f27 EAN/UPC Produktbeschreibung: Microsoft Azure Active Directory Premium - Abonnement-Lizenz (1 Monat) - 1 Benutzer Produkttyp Abonnement-Lizenz - 1 Monat Kategorie Online- & Appliance-basierte Services - Online- & Appliance-basierte Services - Cloud-Computing-Software Installationstyp Gehostet - IaaS Anzahl Lizenzen 1 Benutzer Lizenzpreise Volumen Lizenzprogramm Microsoft Cloud Solution Provider (CSP) Ausführliche Details Allgemein Kategorie Online- & Appliance-basierte Services - Cloud-Computing-Software Produkttyp Abonnement-Lizenz - 1 Monat Installationstyp Gehostet - IaaS Lizenzierung Lizenztyp 1 Benutzer Lizenzpreise Volumen Lizenzprogramm Microsoft Cloud Solution Provider (CSP)

Anbieter: JACOB Computer
Stand: 24.09.2020
Zum Angebot
Efficient adaptive query processing on large da...
3,49 € *
ggf. zzgl. Versand

Nowadays, many companies are migrating their applications and data to cloud service providers, mainly because of their ability to answer quickly to business requirements. Thereby, the performance is an important requirement for most customers when they wish to migrate their applications to the cloud. Therefore, in cloud environments, resources should be acquired and released automatically and quickly at runtime. Moreover, the users and service providers expect to get answers in time to ensure the service SLA (Service Level Agreement). Consequently, ensuring the QoS (Quality of Service) is a great challenge and it increases when we have large amounts of data to be manipulated in this environment. To resolve this kind of problems, several researches have been focused on shorter execution time using adaptive query processing and/or prediction of resources based on current system status. However, they present important limitations. For example, most of these works does not use monitoring during query execution and/or presents intrusive solutions, i.e. applied to the particular context. The aim of this book is to present the development of new solutions/strategies to efficient adaptive query processing on large databases available in a cloud environment. It must integrate adaptive re-optimization at query runtime and their costs are based on the SRT (Service Response Time - SLA QoS performance parameter). Finally, the proposed solution will be evaluated on large scale with large volume of data, machines and queries in a cloud computing infrastructure. Finally, this work also proposes a new model to estimate the SRT for different request types (database access requests). This model will allow the cloud service provider and its customers to establish an appropriate SLA relative to the expected performance of the services available in the cloud.

Anbieter: buecher
Stand: 24.09.2020
Zum Angebot
Efficient adaptive query processing on large da...
3,49 € *
ggf. zzgl. Versand

Nowadays, many companies are migrating their applications and data to cloud service providers, mainly because of their ability to answer quickly to business requirements. Thereby, the performance is an important requirement for most customers when they wish to migrate their applications to the cloud. Therefore, in cloud environments, resources should be acquired and released automatically and quickly at runtime. Moreover, the users and service providers expect to get answers in time to ensure the service SLA (Service Level Agreement). Consequently, ensuring the QoS (Quality of Service) is a great challenge and it increases when we have large amounts of data to be manipulated in this environment. To resolve this kind of problems, several researches have been focused on shorter execution time using adaptive query processing and/or prediction of resources based on current system status. However, they present important limitations. For example, most of these works does not use monitoring during query execution and/or presents intrusive solutions, i.e. applied to the particular context. The aim of this book is to present the development of new solutions/strategies to efficient adaptive query processing on large databases available in a cloud environment. It must integrate adaptive re-optimization at query runtime and their costs are based on the SRT (Service Response Time - SLA QoS performance parameter). Finally, the proposed solution will be evaluated on large scale with large volume of data, machines and queries in a cloud computing infrastructure. Finally, this work also proposes a new model to estimate the SRT for different request types (database access requests). This model will allow the cloud service provider and its customers to establish an appropriate SLA relative to the expected performance of the services available in the cloud.

Anbieter: buecher
Stand: 24.09.2020
Zum Angebot
Placement of SaaS Components in Cloud Computing...
39,90 € *
ggf. zzgl. Versand

The SaaS deployment is the installation to delivery of software services in cloud computing infrastructure. SaaS deployment is initiated by a cloud service provider via a user requesting process, which is generally automated. SaaS is a combination of different type of components, application component, integration component, business component, and storage component. Component placement problem (CPP) concerns with finding the optimum set of VMs on which SaaS components can be placed such that all user requirements should be satisfied and maximizes the profit of the SaaS providers. In CPP, the solution of the problem is subject to a set of resource and SLA constraints. The CPP is presented as a linear programming problem. The CPP has been proven by researchers as an NP-complete, hence the Genetic Algorithm approach has been used to produce sub optimal solution

Anbieter: Dodax
Stand: 24.09.2020
Zum Angebot
Infrastructural Security for Virtualized Grid C...
89,90 € *
ggf. zzgl. Versand

The goal of the grid computing paradigm is to make computer power as easy to access as an electrical power grid. Unlike the power grid, the computer grid uses remote resources located at a service provider. Malicious users can abuse the provided resources, which not only affects their own systems but also those of the provider and others. As a consequence, most commercial customers are not convinced that their intellectual property in the form of software and data is protected in the grid. This book proposes a novel infrastructural security solution that advances the concept of virtualized grid computing. This includes the description of a software that transforms a traditional grid into a virtualized grid including security measures like a grid demilitarized zone, dynamic firewalls and several solutions to protect the grid node itself.

Anbieter: Dodax
Stand: 24.09.2020
Zum Angebot
Fine-Grained Authorization Services in Virtual ...
59,00 € *
ggf. zzgl. Versand

Revision with unchanged content. The last few years have experienced a steady growth in research institutions interest in developing research projects that involve more than one insti tution s computing resources - forming virtual organizations. The goal of any virtual organization is to provide member institutions with an interoperable, easy to use and secure research environment. Shibboleth was one of the pre mier choices of infrastructure to be used to create collaborative inter-institu tional research environments as it provides a coherent architecture to securely share computing resources across multiple institutions without the need for individualized user credentials for each shared resource. Some of the prob lems that Shibboleth encountered in practice deal with its distributed authentication and authorization mechanisms and its user data accessability design. This work addresses these issues and provides a solution that allows for fine-grained authorization services in any virtual organization. We pro pose an extension to the Shibboleth design by separating the definition, management, and usage of the user s virtual organization entitlements from the identity provider. This book is addressed to professionals in Informa tionTechnology, researchers and students in Distributed Systems, Networking and Security.

Anbieter: Dodax
Stand: 24.09.2020
Zum Angebot
Prediction Resources Scheduling in Cloud Comput...
55,90 € *
ggf. zzgl. Versand

The Cloud Computing is more involved in purchasing and consuming manners between providers and customers than other computing paradigms. The core of providing the required services in the Cloud is the on-demand manner, where the customer usually asks for a particular service and the provider has to provide the service with fulfilling its Quality of Service (QoS) requirements. The QoS requirements usually have two main parameters that are needed to be optimized (i.e. minimizing service's response time, and total paid cost). On the other hand, the provider has the right to gain a profit for delivering the service. Accordingly, identifying the convenient resource from the available pool of resources is considered the goal of any resource provisioning algorithm. RPOA is an algorithm that is developed to find the near optimal solution for the resource provisioning problem by achieving the availability and good utilization.

Anbieter: Dodax
Stand: 24.09.2020
Zum Angebot
Intel Trusted Execution Technology for Server P...
37,44 € *
ggf. zzgl. Versand

"This book is a must have resource guide for anyone who wants to ... implement TXT within their environments. I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!"John McAuley,EMC Corporation"This book details innovative technology that provides significant benefit to both the cloud consumer and the cloud provider when working to meet the ever increasing requirements of trust and control in the cloud."Alex Rodriguez, Expedient Data Centers"This book is an invaluable reference for understanding enhanced server security, and how to deploy and leverage computing environment trust to reduce supply chain risk."Pete Nicoletti. Virtustream Inc.Intel® Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as well as establishing a launch control policy that he can use to customize the server's boot process to fit the datacenter's requirements. This book explains how the OS (typically a Virtual Machine Monitor or Hypervisor) and supporting software can build on the secure facilities afforded by Intel TXT to provide additional security features and functions. It provides examples how the datacenter can create and use trusted pools.With a foreword from Albert Caballero, the CTO at Trapezoid.

Anbieter: Dodax
Stand: 24.09.2020
Zum Angebot
Infrastructural Security for Virtualized Grid C...
146,00 CHF *
ggf. zzgl. Versand

The goal of the grid computing paradigm is to make computer power as easy to access as an electrical power grid. Unlike the power grid, the computer grid uses remote resources located at a service provider. Malicious users can abuse the provided resources, which not only affects their own systems but also those of the provider and others. As a consequence, most commercial customers are not convinced that their intellectual property in the form of software and data is protected in the grid. This book proposes a novel infrastructural security solution that advances the concept of virtualized grid computing. This includes the description of a software that transforms a traditional grid into a virtualized grid including security measures like a grid demilitarized zone, dynamic firewalls and several solutions to protect the grid node itself.

Anbieter: Orell Fuessli CH
Stand: 24.09.2020
Zum Angebot