AnArchitectureforConsumer-OrientedOnlineDatabaseServices. chargesonaverage$0.08perdatamessagetoorfrom. thesizeofthemessage),anddatabroadcastingcorp.

Size: px
Start display at page:

Download "AnArchitectureforConsumer-OrientedOnlineDatabaseServices. chargesonaverage$0.08perdatamessagetoorfrom. thesizeofthemessage),anddatabroadcastingcorp."

Transcription

1 AnArchitectureforConsumer-OrientedOnlineDatabaseServices PrasadSistlay,OuriWolfsony,SonDaoz,KailashNarayanany,RamyaRajy Abstract Inthispaperweintroduceanarchitectureforonline databaseservicesorientedtowardsconsumers.we identifytwotypesofcosts accesscostandcommunicationcost.wedemonstratethatdynamicallocation ofdatacanminimizethesecosts.wedosobypresentingecientalgorithmsbasedondynamicallocation; thesealgorithmsoptimizeaccessandcommunication costsforvariouscostmodels,accesspatterns,andretrievalprotocols. 1Introduction Wearewitnessingtheemergenceofanewformofcomputing/communicationenvironment,calledconsumer (asopposedtobusiness)computing.insuchanenvironment,tensofmillionsofconsumerswillcarry portablecomputersequippedwithwirelessdatacommunicatorsthatenableaccesstoalargenumberof databases,digitallibraries,andotheronlineservices. Thepotentialmarketforthisactivityisestimatedto bebillionsofdollarsannually.forexample,passengerswillaccessairlineandothercarriersschedules, aswellasweatherinformation.investorswillaccess pricesofnancialinstruments,salespeoplewillaccess priceandinventorydata,routeplanningcomputersin carswillaccesstracinformation,andcallerswillaccesslocationdependentdata(e.g.whereisthenearest doctor[1]). Therewillbetwotypesofchargesincurredinthis information-at-your-ngertipsenvironment,namely accessandcommunicationcharges.accesscharges willbepaidtotheinformationprovider,andcommunicationchargeswillbepaidtothenetworkprovider. thisresearchwassupportedinpartbynsfgrantnumbersiri andiri ,andafosrgrantnumber F yelectricalengineeringandcomputersciencedepartment, UniversityofIllinois,Chicago,Illinois60607 zhughesresearchlaboratories,informationscienceslaboratory,malibu,ca Forexample,currentlyRAMMobileDataCorp. chargesonaverage$0.08perdatamessagetoorfrom themobilecomputer(theactualchargedependson thesizeofthemessage),anddatabroadcastingcorp. chargesforprovidingthepricesofnancialinstruments.similarly,thesetwotypesofchargesareincurredtodayinvoicecommunication,whencalling900 numbers. Webelievethatthesechargeswillbethedriving forcethatdeterminestheoverallsystemarchitecture, andtheavailableaccessmodesandprotocols.both typesofchargescanbeoptimizedbythedynamicallocationprinciple.thisprinciplestatesthatwhena customerreadsadata-itemmorefrequentlythanthe dataitemisupdated,thentheamountofdatatransfersisminimizedifthecustomerhasasubscriptionto receiveallthechangestothedataitem;andviceversa, whenacustomerreadsadata-itemlessfrequently thanthedataitemisupdated,thentheamountof datatransfersisminimizedifthecustomerdemands thedataitemfromtheonlineserverateachaccess. Inotherwords,acopyofthedataitemshouldbedynamicallyallocatedanddeallocatedatthecustomer's computer,dependingonthefrequencyofcustomerreadscomparedtothefrequencyofdata-item-writes. Thewayinwhichthisprinciplecanbeapplieddependsontheaccessandcommunicationcoststructures,thetypeofknowledgeabouttheaccesspattern totheonlineservice,andtheretrievalprotocolsthat areused.forexample,ifadatatransferon-demandis twiceasexpensiveasadatatransferbysubscription, thencostisoptimizedifasecondcopyofthedataitem iscreatedwhenthenumberofreadsismorethanhalf thenumberofwrites. Inthispaperwedemonstratetheapplicationofthe dynamicallocationprincipleforcostoptimization.we dosoinanarchitecturewepropose,andforseveral typesofaccesspatterns,costmodels,andretrieval protocols.althoughthearchitectureandthecost modelsseemreasonabletous,werealizethatcurrently

2 theindustryisinitsinfancy,andthewaythesefactorswillevolvedependsoncompetitivemarketforces andtechnologicaladvancesthatarehardtopredict atthispointintime.however,webelievethatthe principlecanbeappliedinmanyotherscenariosthat willemerge. Weconsiderthefollowingretrievalprotocols.Assumethatacustomeraccessesthepricesofaportfolio ofstocks.theaccesscanusethesubscriptionprotocol,inwhichthecustomerreceiveseveryupdatetoa portfolio-stockprice,ortheon-demandprotocol,in whichthecustomerrequeststheportfoliopriceswhen needed.theon-demandprotocolmayhaveacache- Invalidationoption,inwhich,followingatransferof thedata-itemtothecustomer,theserverinformsthe customerwhentherstupdatetothedata-itemoccurs,withoutprovidingthenewvalue.thesubscriptionprotocolmaybeparameterizedfordivergence,allowingselectivetransmissionofupdates;forexample, thecustomermayrequestarefreshonlywhenhis/her copydivergesfromthemostup-to-datecopyby3updates,or3%,or3minutes(see[2,3,4]). Weenvisionthatthecustomerwilluseoneofthese retrievalprotocols,andtheonethatoptimizesthe accesscostdependsontwofactors:theaccesscost model,andtheaccesspatterntype.furthermore,the usermaybeabletochangetheretrievalprotocolas theaccesspatternchanges.forexample,theusermay retrievebysubscriptionbetween9amand10am,and on-demandbetween10amand11am. Foroptimizingthecommunicationcost,theretrievalprotocolmayalsobeabletomakeuseof thebroadcastoption.specically,theinformation providermaybeabletochoosewhethertobroadcast aparticularupdateitreceives,ortotransmititina point-to-pointfashiontooneormorecustomers.obviously,whenbroadcastinginformationthatinvolves anaccesscost,thedatawillhavetobeencrypted,so thatonlytheownersofadecryptionkeywillbeable todecipherit. Thecostmodelmaybetime-basedorrequestbased,andthecustomermayhaveachoicebetween thetwo.inatime-basedmodel,thereisaatfeeper timeperiod,e.g.amonth.thisenablesthecustomer toreceiveallthepriceupdatestohisstockportfolio. Inarequest-basedmodelthecustomerischargedper transferofinformation,wherethetransfermaybea resultofsubscriptionordemand. Theoptimalretrievalprotocolalsodependsonthe access-pattern.theaccesspatterntoadatabaseview (e.g.thestockportfolio)isthepatternofreads(by thecustomer)andupdates(bythedatabaseserver) oftheview.thetypesofaccesspatternsthatwe consideraredeterministic,partiallydeterministic,and probabilistic.inadeterministicaccess-pattern,the customer/information-providerknowthetimeofeach readandeachupdate(e.g.thecustomermayknow thats/hereadsthevalueofthedatabaseviewevery dayat5pm,andtheviewisupdatedatmidnight). Inapartiallydeterministicaccesspattern,foreach timeslot(e.g.between9amand10am)thenumber ofreadsandwritesisknown,althoughtheexacttime ofeachaccessisnotknown.inaprobabilisticaccess pattern,expectednumberofreadsandandtheexpectednumberofwritesineachtimeslotareknown. Thecustomerand/ortheinformation-providerdene theaccesspattern,andinputittoanalgorithmthat selectstheoptimalretrievalprotocolforeachslot. Currently,wearebuildingasystemcalledWireless- View,tobeinstalledinmobilecomputersthataccess onlineservices.itreceivesasparameterstheexpected accesspatternandthecostmodel,andselectsaretrievalprotocolthatoptimizestheoverallcost.inthis paperwedescribehowthesystemmakesthisselection forthecostmodels,accesspatterns,andretrievalprotocolsdiscussedabove.somecombinationsof(costmodel,access-pattern-model,retrieval-protocol)have astraight-forwardformulaforcomputingthetotal cost,othersaremorechallenging.forexample,the (linear-time)allocationalgorithmforpartiallydeterministicpatternsinthetimebasedaccess-costmodel wasdiculttodevise,particularlyifthepatternis periodicand/orestimated(i.e.thenumberofreads (writes)inthenexttime-slotisestimatedastheaverageofthenumberofreads(writes)inthelastj slots).thingsarefurthercomplicatedbythefactthat notallprotocolsforcommunication-costoptimization arecompatiblewithprotocolsforaccess-costoptimization. Insummary,themaincontributionsofthispaper areasfollows. Wedemonstratetheapplicationofthedynamic allocationprincipleforcostoptimizationinaccessingonlineservices. Weintroduceanarchitectureforonlinedatabase

3 servicesinaconsumer-orientedenvironment. Weoutlineseveralcostmodelsandfactorsaectingthesecosts. Wepresentecientalgorithmsforoptimizing thesecostsforvariousaccesspatternsandretrievalprotocols. Nowwediscussrelevantwork.Inapreviouspaper ([7]),wehavealsodiscussedoptimalretrievalprotocols,butthatworkwasrestrictedtoaparticularscenariopresentedhere,namelyoptimizationofcommunicationcostforprobabilisticaccesspatternsinthe requestbasedcostmodel.theworkin[8,9]isalso relevanttothispaperbutthatworkconcentrateson broadcasting,whichisnotacentralthemeofourpaper.thewireless-viewsystemdiscussedabovewas conceivedin[6]. Therestofthepaperisorganizedasfollows.Section2discussesthearchitectureofatypicalconsumerorientedonline-servicesenvironment.InSections3 and4wediscussalgorithmsforaccesscostoptimization.section3concentratesonthetimebasedcost model,andsection4concentratesontherequest basedcostmodel.section5,discussescommunicationcostoptimizationbetweentheserveragentand theserver. 2Architecture Theenvironmentconsistsofthreeindependentfunctionalentities,thedatabasepublisher,thenetwork provider,andthecustomers.thedatabasepublisher providesservicestowidegeographicareas,e.g.,the wholeus.thecustomersusemobile/portablecomputers,thusthesystemconsistsofasetmcofactive mobilecomputersandaserverstationarycomputer SCthatstorestheonlinedatabase.Weassumethat eachmobilecomputerinthesetmcisconnectedto SC,i.e.,itcansendandreceivemessagesfromtheSC. TheMCsetvariesovertimesincemobilecomputers candisconnect,turn-onando.althoughwereferto thecomputersinthesetmcasmobilecomputers, someofthemmaybeinaxedlocation,connected bywirelinestothexednetwork.whatmattersfor thepurposeofthispaperisthatthecomputersinthe setmcaccessonlinedatabasesanddigitallibraries usingthearchitectureoutlinedinthissection. Eachcustomerpaysaccesschargestothedatabase publisher,andthedatabasepublisherpaysthenetworkproviderforthecommunication.alternatively, thecustomermaypaycommunicationchargesdirectly tothenetworkprovider.insomecasestheaccess chargeiszero.forexample,iftheuserisasalesperson thataccessestheinventoryinformationinthecorporatedatabase,accesschargewillprobablybezero. Weconsiderretrievalandupdateofadatabase view,x.herexisdenedbyapredicate,anditmay containoneormoredataitems,oritmayconstitute thewholedatabase.forexample,xmaybetheibm stockprice,orthepriceofsomecollectionofstocks, oritmaybethesetofrecordsofaaightsoutof Chicagoon12/12/93,ormailboxoftheuserinthe servercomputer.inthelattercase,awriteistheadditionofamessagetoth box,andareadretrieves theunreadmessages. Weareconcernedwithreadsthatareissuedatthe mobilecomputersandwritesthatareissuedatthe servercomputer.thesearetherelevantrequests. TheuserretrievesinformationfromtheviewxeitherbySubscription,oron-Demand.ASubscription requeststhatallupdatestoxbetransmittedtothe user'smobilecomputer.wealsodiscussthecaseof selectivesubscriptions,wheretheupdateistransmittedonlywhensomethresholdisexceeded(e.g.the priceofthestockexceeds15,ortheviewinthemobilecomputerismorethan10minutesold). Inordertoaccessthedatabaseauserhastoinstall inhis/hermobilecomputerasoftwaremoduleprovidedbythedatabasepublisher.thissoftwaremoduleiscalledtheserveragent(sa);itprocessesthe requestsoftheclientagent(ca),i.e.theuseror his/hersoftware.thecareceivesdatabaseinformationfromthesa,andinturn,thesareceivesinformationfromtheserver. ThisarchitectureillustratedinFigure1. TheSAprovidestotheCAthefollowingservices foreachviewx. subscribe:unsolicitedly,transfertothecaeach updateofx,or,inthecaseofdivergencecaching, selectiveupdates.thetransferisreceivedand processedbythecawhiletheusermaybeusinghis/herconsumercomputerforvariousother purposes. cancelsubscription:thecaindicatestothesa

4 The Architecture Mobile Computer Mobile Computer Client Agent Figure1:Architecture Server Agent Server invalidate:thesaindicatestothecathatthere read:transfertothecathecurrentcontentsof withperformingotherfunctions. thattheclientdoesnotwaitforx,butproceeds x.thisrequestmaybeasynchronousinthesense theviewx. thatthecaisnottoreceivefurtherupdatesto Mobile Computer Mobile Computer els.therst,denotedacm1,isrequest-basedinthe accesscost.wewillconsidertwoaccess-costmod- AccessCost TheinteractionbetweentheSAandtheCAincurs wasanupdateofthex,withoutprovidingthenew followingsense.iftheuserhasasubscriptiontoreceivealltheupdatestox,then,foreachtransferofzero.thisisthecostmodelfortelephone(unlimited numberoflocalcalls)orcabletvservice.inthiscost contents. ablestheusertoreceiveallwritestotheviewforaat feepertimeunit(sayaday).inotherwords,the time-basedinthefollowingsense.asubscriptionen- costpertimeunitisxed,regardlessofthenumber isthecostmodelofnewspapersandmagazines,where thecostpercopyishigheratthenews-standthanfor subscription-delivery. ofwritespropagatedtotheuser.thereisalsoasubscriptioninitiationfee,if,whichisgreaterorequalto Thesecondaccesscostmodel,denotedACM2,is informationfromthedatabasetotheuser,theuser subscriptionrequestsdonotincuranaccesscost.this aquerytoreceivethecurrentcopyofx,thenthe notedsac.ontheotherhand,iftheusersubmits dacsac.weassumethattheinvalidateandcancel- costoftheserviceisdac(demand-access-cost),where ischargedasubscription-access-cost.thiscostisde-modeltheusercanalsosubmitaquerytoreceivethe currentcopyofx,ifs/hedoesnothaveasubscription. Thenthecostoftheserviceisdac.Inthiscostmodel theinvalidaterequestisnotbeingused,andthecancelsubscriptionrequestcarriesazeroaccess-cost. broadcastfacilitymaybeusedfortransmittinginval- CommunicationCost theserverandamobilecomputer.forexample,the point-to-pointandbroadcastcommunicationbetween Weassumethatthenetworkproviderenablesboth,

5 idationmessages,andthepoint-to-pointfacilitymay beusedfordata(thisistheschemeusedin[5]). ThecommunicationbetweentheSAandtheServer incurscommunicationcostasfollows.apointto-pointtransmissionofapage(orless)fromthe ServertotheClientcostscc(chargedbythenetwork provider),andthecostofarequest(toread)sentfrom theclienttotheserveris!.notethat!maybe higherthanccsinceuplinkcommunicationmaybe moreexpensivethandownlinkcommunication.the broadcastofapagefromtheservertoanarbitrary numberofclientscostsb. RetrievalProtocols Wewillconsiderthecostoftwobasicretrievalprotocolsforreadingdatafromtheviewx.Eachone oftheseprotocolscanbeusedforca'sinterfaceto retrievex-datafromthesa,andforsa'sinterfaceto retrievex-datafromtheserver.theobjectiveofeach interfaceistooptimizecost. ThearchitectureinvolvingaccessandcommunicationcostsisdepictedinFigure2. TheRetrievalProtocolsthatweconsiderareDemand,denotedD,andSubscription,denotedS.If thecaretrievesx-datafromthesausingdemand, itmeansthatthecarequeststhecurrentvalueofx foreachreadissuedbytheuser.inotherwords,the CAdoesnotkeepanup-to-datecopyofx.Similarly, ifthesaretrievesx-datafromtheserverusingdemand,itmeansthatthesarequeststhecurrentvalue ofxwheneverneeded. AsafeatureoftheDemandprotocoltheCA(SA) mayrequestcacheinvalidation.thismeansthatthe SA(server)sendsanindicationtotheCA(SA)whenevertheviewxisupdated.Sincethisindicationis cost-free,thefeatureenablestheclienttopayonly forreadsthatareimmediatelyprecededbyawrite. AnotherwaytoimplementCacheinvalidationisto chargetheuseronlyforreadsthatarepresentedwhen thevalueoftheviewxisdierentfromtheonethat existedwhentheimmediatelyprecedingreadwaspresented.thecacheinvalidationfeaturemayormay notbeavailable. IftheCAretrievesx-datafromtheSAusingSubscription,itmeansthattheCArequeststoautomaticallyreceivealltheupdatestotheviewx.Inother words,thecakeepsanup-to-datecopyofx.similarly,ifthesaretrievesx-datafromtheserverusing Subscription,itmeansthattheSArequeststoautomaticallyreceivealltheupdatestotheviewx.The Subscriptionaccessprotocolmaybeparameterizedfor divergence(see[3,4]).specically,thesubscription protocolreceivesaparameterthatenablesaselective transmissionofupdates.forexample,thecamay receiveoneinevery3updatestotheviewx.thiswill beelaborateduponinsection6. AccessPatterns ForagivenRetrievalProtocol,theaccessandcommunicationcostsdependonthecostmodel,which wediscussedabove,andonthetypeofaccesspattern,whichwediscussnext.theusercanprovide access-patterninformationinoneofseveraltypes. Oneisdeterministic,inwhichtheuserspeciesaset oftimestampedrelevantrequests.forexample,the userspeciesthatthereisawriteofxeveryhour onthehour,andreadsat4:05pm,4:30pm,4:50pm and6:05pm.clearly,foreachoneofthecostmodels andforeachprotocolthecostofagivenpatterncan becomputedinastraight-forwardmanner.unfortunately,accesspatterninformationisrarelyavailable inthisform. Asecondtypeofaccesspatternispartiallydeterministic,inwhichtheuserspeciesthenumberofrequestsforeachtimeunit.Forexampletheuserspeciesthatbetween9and10thereare3readsand4 writes,between10and11thereare2readsand5 writes,etc.determinacyisonlypartial,becausethe exacttimeofeachrequestisnotknown. Aspecialcaseofpartialdeterminismiswhenthe numberofrequestsineachtimeunit,insteadofbeing explicitisestimatedasafunctionofthepreviousn timeunits.forexample,thenumberofreadsinany particularhourisisestimatedtobetheaverageofthe numberofreadsineachofthelastvehours. Athirdtypeofaccesspatternisprobabilistic,in whichtheuserspeciestheexpectednumberofrequestsforeachtimeunit.weassumethatthenumbersofreadsandwritesineachtimeunitarerandom variables;weassumethatanypairoftheserandom variablesareindependent.thus,thismodelissimilar tothepartiallydeterministicone,exceptthattheparametersareexpectedintheprobabilisticsense,rather thanexactones.

6 Optimization Structure speciedforaperiodsuchasaday,aweek,oramonth. Figure2:OptimizationStructure Server Agent communication toeachconsumer(user)inorderfortheconsumerto access cost cost optimization optimization beabletooptimizetheaccesscost,andtheconsumer Client Agent providesthereadpatterntothedatabasepublisher,so Eachoneoftheaboveaccesspatterntypescanbe thatthelattercanoptimizethecommunicationcost. ItcanbespeciedthattheAccessPatternisrepeated eachperiod. Thedatabasepublisherprovidesthewritepatterntouse.Inthesecondsubsection,weconsideresti- matedpartiallydeterministicpatternandprovidean algorithmforaccesscostoptimization.inthethird subsection,weconsiderperiodicpartiallydeterministicpatterns.inthefourthsubsection,weconsiderthe RetrievalProtocolDemandwithCacheinvalidation. foreachslotinthepatternwhichofthetwoprotocols Thus,boththeClientandtheServerknowapriorithe Server Computer Mobile Computer typeofaccesspattern,anditsparameters.obviously, weassumethatthereadandwriteaccesspatternsare compatible,i.e.iftheconsumerprovidesaprobablisticreadpattern,thenthedatabasepublisheralso providesthewritepatterninaprobablisticformat,so thatboth,theconsumerandthedatabasepublisher, 3.1PartiallyDeterministicPattern, canarriveatacommonprobablisticaccesspattern. 3AccessCostOptimizationin WeconsidertheissueofaccesscostoptimizationbetweentheClientAgentandtheServerAgentinthe mobilecomputer.wehavetwocostmodels,three RetrievalprotocolsandavarietyofAccessPatterns. Thuswehaveanumberofpossiblecongurations.In thissectionweconsiderthetimebasedcostmodel thetime-basedcostmodelpredenedtimes,e.g.midnight.thus,wecandivide TimeBasedCostModel theentirepatternintoanumbernoftimeslots. Opt,forselectingtheoptimalretrievalprotocolsfora givenpartiallydeterministicaccesspattern.theobjectiveistooptimizeaccesscostinthetimebasedcost model.itisassumedthatwecansubscribeonlyat Inthissubsectionwepresentanalgorithm,called tiveoftheoptalgorithmistoproduceanallocation patterni.e.assignsubscriptionordemandtoeach Givenapartiallydeterministicpattern,theobjec- anddescribealgorithmsforaccesscostoptimization. timeslotinthepattern.thisdeterminestheretrieval Intherstsubsection,weconsidertheSubscriptionProtocolusedfortheslot.Wewillshowthatforthe anddemandretrievalprotocols,i.e.wedeterminegivenpattern,theallocationpatterngivesthemini- mumtotalaccesscost. inguntilitexaminessucientnumberoffutureslots. Thus,atanypointintheexecutionofthealgorithm, iteitherimmediatelydecidesaretrievalprotocolfor theslot,oritkeepsthedecisionfortheslotpend- theslotsoneafteranother.afterexaminingeachslot, ThealgorithmOptoperatesasfollows.Itexamines

7 SDDS DecidedSlotscs z} {?++ UndecidedSlots2r3wj5r6wj {z } UnexaminedSlots Figure3:ClassicationOfSlots thesequenceoftimeslotscanbedividedintothree types,(1)thesequenceofdecidedslotswhichoccur inthebeginning,followedby(2)thesequenceofundecidedslots,i.e.slotsthathavebeenexaminedbut forwhichadecisionispending,followedby(3)the sequenceofunexaminedslots.thedecidedslotsare theslotsforwhichsubscriptionordemandprotocol hasbeenassigned.thealgorithmusestwovariables statusandfus(rstundecidedslot).atanytimethe statusvariabledenotestheretrievalprotocolassigned tothelastdecidedslot,whilefusgivestheindex oftherstundecidedslot.thealgorithmalsouses aprecomputedvaluedfiforeachsloti.here,dfiis thedemandfeefortheithslotandiscomputedasthe productofthenumberofreadsintheithslotandthe demandaccesscostforasinglereadrequest.after theterminationofthealgorithm,thearrayvariable decisioncontainsthedecisionsthathavebeentaken foreachoftheslots.figure3showstheclassication ofthedierentslots. Initially,thestatusvariableisassignedDemand. ThealgorithmOptscanstheslotsonebyone,startingfromtherst.Foreachtimesloti,itcomputes (dfi?ff),wheredfiisthedemandfeeoftheithslot asdescribedabove,andffistheatfeepertime unit.assumethatthevalueofthestatusvariable isdemand.ifthedemandfee(dfi)islessthanor equaltoatfee(ff),i.e.(dfi?ff)0,thealgorithmoptallocatesdemandtothecurrent(ith) slot.ifthedemandfeeisgreaterthantheatfee,i.e. (dfi?ff)>0,itmeansthatsubscriptionischeaper thandemand.however,wecannotassignsubscriptionwheneverthisconditionissatised,becausesubscriptionalsoinvolvesthepaymentoftheinitiation fee(if).so,wecheckwhetherthedemandfee(dfi)is greaterthantheatfee(ff)byif,i.e.dfi?ffif. However,iftheconditionisnotsatisedforasingle slot,wecannotassigndemandtothatslot.thisis becausethecumulativesum(cs)of(dfi?ff)forasequenceofconsecutiveslotsmaysatisfythecondition, i.e.p(dfi?ff)if,althoughforeachindividual slotithedierence(dfi?ff)maybepositiveornegative.so,algorithmoptproceedstothenextslotand computesthecumulativesum(cs),p(dfi?ff). Insummary,whenthevalueofthestatusvariable isdemand(i.e.theretrievalprotocolassignedtothe lastdecidedslotisdemand),thedemandprotocol isassignedtoalltheundecidedslots,i.e.fromthe FirstUndecidedSlottothecurrent(ith)slot,whenevercs0.Ifcsif,thenSubscriptionisassigned toalltheundecidedslotsandthestatusvariablebecomessubscription.ifneitheroftheaboveconditions issatised,thealgorithmproceedstothenextslotand computesthecumulativesumandrepeatstheabove operations. IfthestatusisSubscription,itmeansthattheinitiationfeehasbeenpaid,andwecanallocateSubscriptiontoalltheUndecidedslotswheneverthecumulativesum(cs),Pdfi?ff0.Ifthecs<0,itmeans thatdemandischeaperfortheundecidedslots.however,wecannotchoosedemandifjcsj<if,because ifwehavesubscriptioninanunexaminedslot,we wouldbepayingmoreinswitchingbacktosubscription.thusthealgorithmoptchecksifjcsjif, i.e.itchecksifinitiationfeeisrecoverable.ifso,the algorithmchoosesdemandfortheundecidedslots. Insummary,whenthestatusisSubscription,the SubscriptionprotocolisallocatedtoalltheUndecided slotswhenevercs0.ifcs<0andjcsjif,then DemandisassignedtoalltheUndecidedslotsand thestatusbecomesdemand.ifneitheroftheabove conditionsissatised,thealgorithmoptproceedsto thenextslotandcomputesthecsandrepeatsthe aboveoperations. Ifweareunabletoarriveatadecisionbasedonthe cumulativesumandwereachtheendofthepattern, therearetwopossiblecases,cs<0and0<cs<if. Ineithercase,thealgorithmOptchoosesDemandfor alltheundecidedslots.thisisjustiedbecause,if cs<0,demandischeaperandif0<cs<if,it meansthattheinitiationfeeisnotrecoverable. Aformalpresentationofthealgorithmisgivenin theappendix.

8 3.2EstimatedPartiallyDeterministic Pattern Thissubsectionconsidersestimatedpartiallydeterministicpatternsinwhichthenumberofreads (writes)inthenexttimeslotisestimatedtobethe ooraverageofthenumbersofreads(writes)inthe lastjtimeslots.theallocationalgorithmison-line andatthebeginningofeachtimeslot,itcomputes theestimatedvalueofthenumberofreadsforthe nextoneormoretimeslots,andusestheseestimated valuesforselectingdemandorsubscriptionforthe nexttimeslot. TheOptalgorithmforthepartiallydeterministic patternsgivenintheprevioussectioncanbeadapted totheabovesettingbycombiningitwiththecomputationoftheestimatedvalues,asfollows.atruntime, attheendofeachtimeslot,theestimatednumberof readsforthenexttimeslotiscomputed.then,algorithmoptisusedtocheckifadecisioncanbereached; ifso,weusethecorrespondingselection.otherwise, i.e.iftheslotisundecided,wecomputetheestimated valuesforthetimeslotafterthenext,andrepeatthe aboveprocedureuntiladecisionaboutthenexttime slot(whichisthefirstundecidedslot)canbemade. Itcanbeshownthattheestimatedvalueswilleventuallyconverge,andafterthisthecumulativesum(i.e. thevalueofthevariablecs)ofthealgorithmopt(see section3.1)willmonotonicallyincreaseordecrease; atthattime,wechoosesubscriptionforthenexttime slotifthecumulativesummonotonicallyincreases, otherwisewechoosedemandforthenexttimeslot. Itcanbeshownthattheestimatedvaluesconverge withinciterationswherecisafunctionofjandthe maximumnumberofreadsinanyofthelastjtime slots. Wehaveasimplerandmoreecientmethodfor thecasej=2,butweomitthisdiscussionforspace considerations. 3.3PeriodicPartiallyDeterministic Pattern Anotherspecialcaseofpartialdeterminismisthe casewhentheaccesspatternisperiodic.here,the numbersofreadsandwritesareknownforeachslot inoneperiodofthepattern.thesamepatternrepeats periodically,innitely. DDSSDD 2kDD 1SD Figure4:Non-trivialCase DDD+?k?+?+? {z } UndecidedSlotsk + DDDSSkSSSSSkS Figure5:FUSinthe1stperiod Theallocationpatternobtainedfortherstperiod cannotbedirectlyassignedtoalltheotherperiodsfor thefollowingreason.whenweconsidertwoadjacent periodswemayhavethecaseillustratedinfigure4. There,thesegments1and2areinbetweentwo Subscriptionslots.Itispossiblethatthecumulative sumofallslotsin1and2isgreaterthan?if.ifthis isthecase,thenallslotsin1and2shouldbeallocated Subscription.Forthisreasonwemodifythealgorithm asfollowsandapplytothersttwoperiods.theopt algorithmismodiedsothatifeitheroftheinner Repeatloopsterminatebecausetheendofthesecond periodisreached,thenforalltheundecidedslotsfrom FirstUndecidedSlottotheendofthesecondperiod, theallocationpatternischosenasfollows.ifthefirst UndecidedSlotisintherstperiod,thenwechoose SubscriptionforalloftheUndecidedslots.Thisis illustratedinfigure5.otherwise,i.e.,ifthefirst UndecidedSlotisinthesecondperiod,thenforeach ithslot(ifus)inthesecondperiod,wechoose theallocationpatternofthecorrespondingslotsin therstperiod.thisisillustratedinfigure6. Forallotherperiods,followingthesecondperiod, werepeattheallocationpatternofthesecondperiod. Theaboveallocationmethodcanbeshowntoproduceanoptimalallocationpattern.Theproofofcorrectnessofthismethodisomittedduetolackofspace.

9 SSDDS j1s kkssddundecidedslots z} { + 2j1+ 2k + SSDSDSSkSSDDSS Figure6:FUSinthe2ndperiod 3.4DemandwithCacheinvalidation InthissubsectionweconsidertheRetrievalProtocols SubscriptionandDemandwithCacheinvalidation. Weassumethatthepatternispartiallydeterministic. Theobjectiveistooptimizeaccesscostinthetime basedcostmodel.intheretrievalprotocoldemandwith-cache-invalidation,theclienthastopayonlyfor thereadsthatareimmediatelyprecededbyawrite, i.e.thecriticalreads.theexpectednumberofcriticalreadsnc,assumingthattherearenrreadsand nwwritesinatimeslotandassumingthattheyare uniformlydistributed,isgivenasfollows. nc=nrnw nr+nw Thentheexpecteddemandfeeforaslotisncdac. Withthisreviseddemandfee,thealgorithmOptcan beappliedverbatimforaccesscostoptimization. Thealgorithmsthatoptimizeaccesscostforthe estimatedandperiodicpatternscanalsobeapplied verbatimusingthesoreviseddemandfee. 4AccessCostOptimization intherequest-basedcost Model Inthissection,weconsiderthecombinations(AccessPattern,RetrievalProtocol)intherequestbased costmodel,andwedevelopalgorithmsforaccesscost optimization. Intherequestbasedcostmodel,whenevertheuser submitsaquerytoreceivethecurrentcopyoftheview x,thenthecostoftheserviceisdemand-access-cost (dac).iftheuserhasasubscriptiontoreceiveall theupdatestox,thenforeachtransferofinformationfromtheservertotheuser,theuserischargeda subscription-access-cost(sac). Firstweconsiderthecaseinwhichthepossible choicesofretrievalprotocolsaresubscriptionanddemand,i.e.thecache-invalidationoptionisunavailable.asbefore,therearethreetypesofaccesspatterns,i.e.deterministic,partiallydeterministicand probabilistic. Foreachtypeofaccesspattern,thealgorithmfor accesscostoptimizationistrivial.foreachtimeslot iweneedtocomparethesubscriptionfeesi=nw sacandthedemandfeedi=nrdac,andassignthe protocolthatincursalowercost. Now,whatexactlyarenrandnwintheaboveformula?Iftheaccesspatternisdeterministic,theClient needstopayonlyforthosereadsthatfollowawrite. Thusnristhenumberofreadsthatimmediatelyfollowawrite,andnwisthetotalnumberofwritesin theslot. Iftheaccesspatternispartiallydeterministic,we aregiventhenumberofreads(nr)andwrites(nw)in everytimeslot. Iftheaccesspatternisprobabilistic,nristheexpectednumberofreadsintimeunit,andnwisthe expectednumberofwritesinunittime.obviously, intheprobabilisticcase,thecostoptimizedistheexpectedcostratherthantheexactone. Nowassumethatthecacheinvalidationoptionis available.asbefore,foreachtypeofaccesspattern wecomparethesubscriptioncost,si=nwsacwith thedemandcost,di=ncdac,andchoosetheprotocolthatgivestheminimalcostforthatslot.theonly dierenceisthatweusenc(ratherthannr).thisis thenumberofcriticalreads,i.e.readsthatimmediatelyfollowawriteintheslot. 5CommunicationCostOptimization InthissectionweconsidertheissueofcommunicationcostoptimizationbetweentheServerandthe ServerAgentinthemobilecomputer.Again,there arethreeretrievalprotocolsthatcouldbeusedbythe ServerAgent,i.e.Subscription(S),Demand(D),and DemandwithCacheinvalidation(DCI). WeassumethattheRetrievalProtocolbetweenthe ClientAgentandtheServerAgent(calledtheAccess Protocol)hasbeenxed.Thereasonisthatthecon-

10 sumercan,independentlyofthedatabasepublisher, selectaretrievalprotocolforaccesscostoptimization. Thisimposesaconstraintonthepossiblechoicesof RetrievalProtocolsbetweentheServerAgentandthe Server(calledtheCommunicationProtocol).Inorder toseethisconsiderthefollowingcase.lettheretrieval protocolbetweentheserveragentandtheclientbe Subscription.ThenalltheupdateshavetobepropagatedbytheServerAgenttotheClient.Itisclearly evidentthatdemandcannotbeusedastheretrieval ProtocolbetweentheServerAgentandtheServer. Thusinthiscase,theonlyavailableretrievalprotocol betweentheserveragentandtheserverissubscription.thetablebelowgivesthepossiblechoicesof RetrievalProtocolsbetweentheServerAgentandthe Server,foragivenprotocolbetweentheClientAgent andtheserveragent. AccessProtocolCommunicationProtocol Subscription Subscription Demand Subscription Demand Demand Demand DCI DCI DCI DCI Subscription Fortherestofthissectionweassumethataccess patternispartiallydeterministic,butourapproach canbeappliedtoothertypesofaccess-patterns.now weselectforeverymobilecomputerandforeverytime slottheretrievalprotocolthatminimizesthepoint-topoint(ptp)transmissioncost,fromtheavailableprotocolchoices.ifthebroadcastmodeisunavailablethen ourprotocolselectionprocessendshere.thus,assume fortherestofthissectionthatbroadcastisavailable. Wewilldeterminewhetherornotthebroadcastmode canfurtherreducethecostoftheoptimalptpprotocol.asmentionedinsection2,thebroadcast-costof asinglewrite/pageisb,andatthiscostthepagecan besenttoalltheactivemobilecomputers. Assumethatthenumberofmobilecomputersthat areactive,i.e.turnedon,atanypointintimeis knownapriori,andtheaccesspatternofeachoneof themisalsoknown.thisisthecase,forexample, inacompanythathasaxednumberofsalespersons accessingtheinventorydatabase.thenwecompute thefollowinginequalityforeachtimeslot. Bnwk1nwcc+k2 Xi=1nri(cc+!)+k3 Xi=1nci(2cc+!) Intheaboveformulak1isthenumberofmobile computerswithsubscriptionastheoptimalptpretrievalprotocol,andnwisthenumberofwritesin thetimeslot.observethatnwisidenticalintheaccesspatternsofallmobilecomputers,sinceitisthe numberofwritesattheserver,andisindependent ofaparticularmobilecomputer.k2isthenumber ofmobilecomputerswithdemandastheoptimalptp protocol;nriisthenumberofreadsoftheithsuchmobilecomputer.k3isthenumberofmobilecomputers withdemand-with-cache-invalidationastheoptimal ptpprotocol;nciisthenumberofcriticalreads(forthe methodofcomputingthenumberofcriticalreads,see subsection3.4)oftheithsuchmobilecomputer. Iftheaboveinequalityissatised,thenthecostof broadcastingeachwriteislessexpensivethanthetotalcostofusingtheoptimalptpcommunicationprotocolforeachmobilecomputer.theneachsawill usethesubscriptioncommunicationprotocol(which, ascanbeseenfromtheprevioustable,iscompatiblewitheveryaccessprotocol),andthedatawillbe broadcastedduringthistimeslot.otherwise,i.e.if theinequalityisnotsatised,eachmobilecomputer willuseintheslottheoptimalptpprotocolselected intherststage. Now,whetherornotthenumberofactivemobile computersisknownapriori,consideratimeslotin whichsubscription-with-broadcastisnottheoptimal protocol.atruntime,thebroadcastmodecanstillbe usedtoreducecommunicationcost,asfollows.when awriteisreceivedattheserver,thedatabaseserver computesk,thethenumberofmobilecomputersthat haveasubscriptiontoreceivethewriteinaptpmode, or,havetoreceiveaninvalidationptpmessageasaresultofthewrite.thentheserverdetermineswhether thefollowinginequalityissatised. Bkcc ccisthecostofptptransmissionofasinglepage.ifthe aboveinequalityholds,thewriteisbroadcasted.otherwisethewriteand`invalidate'messagesaretransmittedpoint-to-point.

11 References [1]TomaszImielinskiandB.R.Badrinath.Mobile WirelessComputing:ChallengesinDataManagement.CommunicationsoftheACM,37:(10), Oct.1994 [2]R.Alonso,D.Barbara,andH.Garcia-Molina. Quasi-copies:Ecientdatasharingforinformationretrievalsystems.InProc.ofEDBT'88, LNCS303.SpringerVerlag,1988. [3]R.Alonso,D.Barbara,andH.Garcia-Molina. Datacachingissuesinaninformationretrieval system.acmtrans.databasesyst.,15(3):359{ 384,1990. [4]Y.Huang,R.Sloan,O.Wolfson.Divergence CachinginClient-ServerArchitectures.ProceedingsofthethirdInternationalConference onparallelanddistributedinformationsystems (PDIS),Austin,TX,Sept.1994,pp [5]DanielBarbara,TomaszImielinski.Sleepersand Workaholics:CachingStrategiesinMobileEnvironments.ACMSigmod,1994. [6]O.Wolfson.DataAllocationinMobileComputing:AProjectDescription.Proceedingsofthe IEEEWorkshoponAdvancesinParallelandDistributedSystems,Princeton,NJ,Oct.1993,pp [7]Y.Huang,P.Sistla,O.Wolfson.DataReplicationforMobileComputers.Proceedingsofthe ACM-SIGMOD1994,InternationalConference onmanagementofdata,minneapolis,mn,may 1994,pp [8]Tzi-ckerChiueh.SchedulingforBroadcast-based FileSystems.MobidataWorkshop,Nov [9]S.Acharya,R.Alonso,M.Franklin,S.Zdonik. BroadcastDisks:DataManagementForAsymmetricCommunicationEnvironments.ProceedingsoftheACM-SIGMOD1995,International ConferenceonManagementofData. TheAlgorithmOpt fi:=1 last:=n status:=demand whileilast fcs:=0 FUS:=i Ifstatus=Demand frepeat cs:=cs+(dfi?ff) i:=i+1 until((cs0)w(csif)w(i>last)) if(csif) status:=subscription g elsefrepeat cs:=cs+(dfi?ff) i:=i+1 until((cs0)w(cs?if)w(i>last)) if((cs?if)w(i>last)) status:=demand g forj=fusuptoi?1 decision[j]=status g g

''Get to know the ECOWAS''

''Get to know the ECOWAS'' ''Get to know the ECOWAS'' Fostering peace, security and democracy in West Africa is one of the main objectives of the Economic Community of West African States (ECOWAS). In 12 essays, young West African

More information

NSD ERP - Integrated Solutions NSD ERP SYSTEM. Flow chart. Copyright 2009 NSD, All rights reserved

NSD ERP - Integrated Solutions NSD ERP SYSTEM. Flow chart. Copyright 2009 NSD, All rights reserved Integrated Applications System Flow chart is an Integrated Applications System We prepared this document, asanoverview, in order to give you a bi briefidea about the Flowchart ( integration ti ) of the

More information

Who needs an ERP system anyway? Nitin Kale kale@usc.edu Information Technology Program, VSoE Spring 2013

Who needs an ERP system anyway? Nitin Kale kale@usc.edu Information Technology Program, VSoE Spring 2013 Who needs an ERP system anyway? Nitin Kale kale@usc.edu Information Technology Program, VSoE Spring 2013 Outline Why ERP? SAP Background SAP Architecture Integrated Business Process Sales About ITP/SAP

More information

AirWatch Education Pricing. Effective January 1 st, 2012 Expires March 31 st, 2012

AirWatch Education Pricing. Effective January 1 st, 2012 Expires March 31 st, 2012 AirWatch Education Pricing Effective January 1 st, 2012 Expires March 31 st, 2012 Deployment Options Software as a Service (SaaS) On-premise Appliance Multiple redundant data centers Best of class hardware

More information

HOW TO... Use Lump Sum Billing Items

HOW TO... Use Lump Sum Billing Items Date: 17 October 2011 Document Version: 1.0 Prepared by: Earliest available version of COINS: Richard Werner COINS Ti These notes are published as guidelines only. This How to Guide may contain recommendations

More information

Springpath Data Platform with Cisco UCS Servers

Springpath Data Platform with Cisco UCS Servers Springpath Data Platform with Cisco UCS Servers Reference Architecture March 2015 SPRINGPATH DATA PLATFORM WITH CISCO UCS SERVERS Reference Architecture 1.0 Introduction to Springpath Data Platform 1 2.0

More information

SAP ONLINE COURSES ARGUMENTS

SAP ONLINE COURSES ARGUMENTS SAP ONLINE COURSES ARGUMENTS SAP Overview Introduction to SAP; The functional architecture of SAP; The professionals in the SAP world; The organizational structure of SAP; How to access the application:

More information

MANAGING AN ERP IMPLEMENTATION PROJECT USING BASIC SOFTWARE TOOLS AND WEB BASED SCHEDULING CONTROL

MANAGING AN ERP IMPLEMENTATION PROJECT USING BASIC SOFTWARE TOOLS AND WEB BASED SCHEDULING CONTROL MANAGING AN ERP IMPLEMENTATION PROJECT USING BASIC SOFTWARE TOOLS AND WEB BASED SCHEDULING CONTROL Accepted for publication at III European Project Management Conference Jerusalem Israel 2000 PMI Global

More information

Stateless Approach to End-to-End Security for the Internet of Things (OSCAR Object Security Architecture for the IoT)

Stateless Approach to End-to-End Security for the Internet of Things (OSCAR Object Security Architecture for the IoT) Stateless Approach to End-to-End Security for the Internet of Things (OSCAR Object Security Architecture for the IoT) Mališa Vučinić v, Bernard Tourancheau v, Franck Rousseau v, Andrzej Duda v, Laurent

More information

Orange County Convention Center Orlando, Florida June 3-5, 2014. Architecturing the cloud for your SAP landscape Florian Stilkerich

Orange County Convention Center Orlando, Florida June 3-5, 2014. Architecturing the cloud for your SAP landscape Florian Stilkerich Orange County Convention Center Orlando, Florida June 3-5, 2014 Architecturing the cloud for your SAP landscape Florian Stilkerich LEARNING POINTS What are the different types of Cloud Enterprise Architecture

More information

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017 From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days

More information

Implementing and Maintaining Microsoft SQL Server 2005 Reporting Services COURSE OVERVIEW AUDIENCE OUTLINE OBJECTIVES PREREQUISITES

Implementing and Maintaining Microsoft SQL Server 2005 Reporting Services COURSE OVERVIEW AUDIENCE OUTLINE OBJECTIVES PREREQUISITES COURSE OVERVIEW This three-day instructor-led course teaches students how to implement a ing Services solution in their organizations. The course discusses how to use the ing Services development tools

More information

FIS InfoHub. K.S. Bhaskar. 2014 Fidelity National Information Services, Inc. and its subsidiaries.

FIS InfoHub. K.S. Bhaskar. 2014 Fidelity National Information Services, Inc. and its subsidiaries. FIS InfoHub K.S. Bhaskar 2014 Fidelity National Information Services, Inc. and its subsidiaries. What is FIS InfoHub? Operational monitoring of GT.M environments via SNMP 2 Design Considerations Challenges

More information

Networking Basics for Automation Engineers

Networking Basics for Automation Engineers Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------

More information

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA

Computers and Media: P2P and Business Models CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA Computers and Media: P2P and Business Models CSCI 1200 JAREK SZLICHTA CSCI 1200 COMPUTERS & MEDIA, JAREK SZLICHTA 1 Agenda difference between client-server and peer-to-peer technology business models used

More information

Cormant-CS System Requirements

Cormant-CS System Requirements Cormant-CS System Requirements For Cormant-CS 8: Hardware Requirements Cormant-CS Server: 2 GHz or higher quad-core processor 8GB RAM 80 GB free hard disk space (including program and database space) Cormant-CS

More information

2016 TRAINING CALENDAR

2016 TRAINING CALENDAR 2016 TRAINING CALENDAR Country Course Description Month Date # of Days Course fee (USD) Nigeria Software Testing Boot Camp Course ISTQB Foundation Level Certification (Mon Feb 1-5 5 1, Nigeria Software

More information

Preparing Your Business for Magento 2.0

Preparing Your Business for Magento 2.0 Preparing Your Business for Magento 2.0 William Harvey Director of Business Operations Magento Commerce How is Magento 2.0 different than 1.x? How is Magento 2.0 different than 1.x? New architecture Out-of-the-box

More information

Cisco SmartPlay Select. Cisco Global Data Center Promotional Program

Cisco SmartPlay Select. Cisco Global Data Center Promotional Program Cisco SmartPlay Select Cisco Global Data Center Promotional Program SmartPlay Select Program Program Goals and Benefits UCS Promotional offers to accelerate new UCS customers acquisition by showcase Cisco

More information

Information Models and Master Data Management in Business Process Management

Information Models and Master Data Management in Business Process Management Information Models and Master Data Management in Business Process Management Timo Itälä SoberIT, TKK Outline Example of a business process and business services Need for common master data in SOA Discovering

More information

The Path to the Cloud

The Path to the Cloud The Path to the Cloud Andy Ingram VP Juniper Networks - Center of Excellence EIS 2015 Path to the Cloud 1 Consolidation Lower Cost 2 Optimization Greater Agility & Availability Network Topology, Automation

More information

Hadoop Optimizations for BigData Analytics

Hadoop Optimizations for BigData Analytics Hadoop Optimizations for BigData Analytics Weikuan Yu Auburn University Outline WBDB, Oct 2012 S-2 Background Network Levitated Merge JVM-Bypass Shuffling Fast Completion Scheduler WBDB, Oct 2012 S-3 Emerging

More information

Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services

Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services Course 6236A: Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services Length: 3 Days Published: December 05, 2008 Language(s): English Audience(s): IT Professionals Level: 200 Technology:

More information

Enterprise-Wide Information Systems in the Modern Organization

Enterprise-Wide Information Systems in the Modern Organization Enterprise-Wide Information Systems in the Modern Organization Module SAP 1 1 ERP in Modern Business: Topics Historical Perspective of IS in Business Levels of IT in Organization Examine ERP s and SAP

More information

On Demand SAP Support Services Overview

On Demand SAP Support Services Overview Committed to Your Success On Demand SAP Support Services Overview November 2005 Table of Contents About Us The Outsourcing Marketplace and SAP On Demand Support Services for SAP - Overview Atrinity Value

More information

A Comparative Study of Load Balancing Algorithms in Cloud Computing

A Comparative Study of Load Balancing Algorithms in Cloud Computing A Comparative Study of Load Balancing Algorithms in Cloud Computing Reena Panwar M.Tech CSE Scholar Department of CSE, Galgotias College of Engineering and Technology, Greater Noida, India Bhawna Mallick,

More information

Vision & Mission PURPOSE VISION MISSION

Vision & Mission PURPOSE VISION MISSION www.nathealth.net Vision & Mission PURPOSE We serve the insurance companies and the corporate self insured funds by providing creative expertise to help them audit, adjudicate, process their medical healthcare

More information

2016 SUBSCRIPTION. The NFWI Board of Trustees has set the 2016 subscription rate at 37.50 2016 WI 18.00. Federation 8.40 NFWI 11.10. Total 37.

2016 SUBSCRIPTION. The NFWI Board of Trustees has set the 2016 subscription rate at 37.50 2016 WI 18.00. Federation 8.40 NFWI 11.10. Total 37. 2016 SUBSCRIPTION The NF Board of Trustees has set the 2016 subscription rate at 37.50 2016 18.00 8.40 NF 11.10 37.50 Payment is due from members in January 2016 Dual members will pay 18.00 to their second

More information

บทท 1 บทน า ๑. หล กการและเหต ผล ๒. ว ตถ ประสงค

บทท 1 บทน า ๑. หล กการและเหต ผล  ๒. ว ตถ ประสงค บทท 1 บทน า ๑. หล กการและเหต ผล การจ ดก จกรรมการเร ยนการสอนตามหล กส ตรการศ กษาตามพระราชบ ญญ ต การศ กษา แหงชาต พ.ศ. 2542 แก#ไขเพ มเต มฉบ บท 2 พ.ศ. 2545 ก าหนด ให#ม การเร ยนการสอนในกล ม สาระก จกรรมพ ฒนาผ

More information

Data Cached in Client 1 Data in Broadcast Program Database in Server. Hot. Cold. e broadcast program a a Queries in Client 1: i, a, c, e, d, g, i, j

Data Cached in Client 1 Data in Broadcast Program Database in Server. Hot. Cold. e broadcast program a a Queries in Client 1: i, a, c, e, d, g, i, j DynamicDataDeliveryinWireless QinglongHu1,DikLunLee1,andWang-ChienLee2 CommunicationEnvironments 2GTELaboratoriesIncorporated,40SylvanRoad,Waltham,MA02254, 1UniversityofScienceandTechnology,ClearWaterBay,HongKong,

More information

Systems for Personal Data Storage Services

Systems for Personal Data Storage Services NTT DoCoMo Technical Journal Vol. 8 No.2 Systems for Personal Data Storage Services Makoto Hamatsu, Tetsuo Sato and Eiji Yano As part of DoCoMo s efforts toward secure and safe mobile terminals, we developed

More information

An IT executive with over 25 years in the field A few companies I have worked for:

An IT executive with over 25 years in the field A few companies I have worked for: Jerry Gitlitz An IT executive with over 25 years in the field A few companies I have worked for: Chase Manhattan Bank IBM Goldman Sachs Bank of America I am ITIL, Six Sigma and CMM certified. Currently

More information

E-Appointment Scheduling (EAS)

E-Appointment Scheduling (EAS) E-Appointment Scheduling (EAS) Noraziah Ahmad, Roslina Mohd Sidek, and Mohd Affendy Omardin Abstract E-Appointment Scheduling (EAS) has been developed to handle appointment for UMP students, lecturers

More information

BDS / B. V. Sc & AH degree recognized by DCI / VCI with 5 years R&D / teaching experience in the relevant subject after BDS / B. V. Sc degree.

BDS / B. V. Sc & AH degree recognized by DCI / VCI with 5 years R&D / teaching experience in the relevant subject after BDS / B. V. Sc degree. RESEARCH SCIENTIST II (MEDICAL) Post Graduate degree (MD/MS/DNB) with one year R&D / teaching experience or Post graduate diploma in medical subjects with two years R&D / teaching experience in the required

More information

Business Administration Prof. Dr. J. Nonhoff. Content. Business Administration Prof. Dr. J. Nonhoff. Introduction ERP Vendors/ Architecture SAP

Business Administration Prof. Dr. J. Nonhoff. Content. Business Administration Prof. Dr. J. Nonhoff. Introduction ERP Vendors/ Architecture SAP Content. / ERP. ERP-Vendors /.. with. Learning goals. Definition. Characteristics ERP Systems Grenoble 0 : Learning goals (for the whole module) : Application area At the end of the course you will be

More information

UCS Network Utilization Monitoring: Configuration and Best Practice

UCS Network Utilization Monitoring: Configuration and Best Practice UCS Network Utilization Monitoring: Configuration and Best Practice Steve McQuerry Technical Marketing Engineer Unified Computing Systems Cisco Systems, Inc. Document Version 1.0 1 Copyright 2013 Cisco

More information

ISOM4740 Enterprise Resource Management Winter 2012

ISOM4740 Enterprise Resource Management Winter 2012 ISOM4740 Enterprise Resource Management Winter 2012 Department of Information Systems, Business Statistics, and Operations Management COURSE: ISOM4740 Enterprise Resource Management (3-0-0:3) This course

More information

Proceedings of the 11th Annual Conference of Asia Pacific Decision Sciences Institute Hong Kong, June 14-18, 2006, pp. 178-182.

Proceedings of the 11th Annual Conference of Asia Pacific Decision Sciences Institute Hong Kong, June 14-18, 2006, pp. 178-182. Proceedings of the 11th Annual Conference of Asia Pacific Decision Sciences Institute Hong Kong, June 14-18, 2006, pp. 178-182. AN INNOVATIVE POSTGRADUATE PROGRAM ON ENTERPRISE RESOURCE PLANNING MASTER

More information

Americas' SAP Users' Group

Americas' SAP Users' Group Americas' SAP Users' Group Big Bang for the Bucks! Improving Finance Processes with Excel, an SME Controller's Perspective Bob Oldrati, Controller & IT Director, Powell Electronics (retired) Tim Curtin,

More information

Public, Private and Hybrid. Not Quite That Simple

Public, Private and Hybrid. Not Quite That Simple The Cloud Landscape of Choices When making information technology decisions, executives begin by choosing between internal (in the data center) and external (with a cloud provider). Although it sounds

More information

SD Elements: A Tool for Secure Application Development Management

SD Elements: A Tool for Secure Application Development Management SD Elements: A Tool for Secure Application Development Management Golnaz Elahi 1, Tom Aratyn 2, Ramanan Sivaranjan 2, Rohit Sethi 2, and Eric Yu 3 1 Department of Computer Science, University of Toronto,

More information

IoT Analytics for smart Health and Care

IoT Analytics for smart Health and Care IoT Analytics for smart Health and Care IoT Week 2015 Professor Dr. Ch. Thuemmler Technische Universität München, Edinburgh Napier University christoph.thuemmler@tum.de IoT relevant Statistics Gartner

More information

Oracle Linux Support and Oracle VM Support Global Price List

Oracle Linux Support and Oracle VM Support Global Price List Oracle Linux Support and Oracle VM Support Global List December 1, 2014 For educational purposes only. Subject to change without notice. 1 of 8 Oracle Linux Support s in USA (Dollar) License Support Licensing

More information

Section 1: Pre-requisites (This is a mandatory Section. Do not proceed without completing it)

Section 1: Pre-requisites (This is a mandatory Section. Do not proceed without completing it) Training and Career Mentoring SAP Installation & Hamachi VPN Client Set Up Instructions 6030 Unity Dr Suite #B Norcross GA 30071 http://www.targetittraining.com 1 This document has all the necessary information

More information

Large-Scale IP Traceback in High-Speed Internet

Large-Scale IP Traceback in High-Speed Internet 2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint

More information

802.3ah Operations Management: Requirements From A Diverse Services Provider

802.3ah Operations Management: Requirements From A Diverse Services Provider 802.3ah Operations Management: Requirements From A Diverse Services Provider Roy Bynum Global Access Technology Development WorldCom 1 Data Transmission Service Provider OAM Need to support wide diversity

More information

Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions

Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20533 - Implementing Microsoft Azure Infrastructure Solutions Length 5 days Price $4389.00 (inc GST) Version C Overview This course is intended for IT professionals

More information

NSD Business Controlling System NSD BCS 4.01

NSD Business Controlling System NSD BCS 4.01 2009 NSD Business Controlling System NSD BCS 4.01 Alert Messages Center Exchange System Copyright 2009, NSD all rights reserved info@mynsd.info Table of Contents NSD Business Controlling System (NSD BCS)...

More information

OpenNCP MRO Service Design and Engineering details

OpenNCP MRO Service Design and Engineering details Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of Patient Summary and Electronic Prescription Design APPENDIX E D 3.B.2 WORK PACKAGE WP3.B DOCUMENT NAME

More information

to performance evaluation, in contrast to demand

to performance evaluation, in contrast to demand ITC 11, inoru Aldyama (Editor) E~sevier Science Publishers B. V. (North-Holland) lac, 1985 PERFORANCE ANALYSIS OF INTEGRATED COUNICATION SYSTE WITH HETEROQENEOUS TRAFFIC Shun-ichi IISAKU and Yoshiyori

More information

Handshake & endpoints

Handshake & endpoints WebSockets Handshake & endpoints GET /path/to/websocket/endpoint HTTP/1.1 Host: localhost Upgrade: websocket ConnecAon: Upgrade Sec- WebSocket- Key: xqbt3imnzjbyqrinxeflkg== Origin: hsp://localhost Sec-

More information

Computing Service Provision in P2P Clouds

Computing Service Provision in P2P Clouds Computing Service Provision in P2P Clouds Ghislain FOUODJI TASSE Supervisor: DR. Karen BRADSHAW Department of Computer Science Rhodes University Research Statement Leverage advantages of cloud computing

More information

IBM: Using Queue Replication

IBM: Using Queue Replication coursemonster.com/uk IBM: Using Queue Replication View training dates» Overview Gain knowledge on InfoSphere Replication Server and how it is used to perform both queue-based homogeneous data replication

More information

Troubleshooting for Yamaha router

Troubleshooting for Yamaha router Troubleshooting for Yamaha router How to troubleshoot This document describes how to troubleshoot for Yamaha router. - Some points which should be considered before the trouble - What you should do when

More information

Integrating ERP Project System into IS Project Management Curriculum

Integrating ERP Project System into IS Project Management Curriculum Integrating ERP Project System into IS Project Management Curriculum Ming Wang ming.wang@calstatela.edu Department of Information Systems California State University, Los Angeles Los Angeles, CA 90032,

More information

Optimization Alternatives of Information Systems for Risk Management

Optimization Alternatives of Information Systems for Risk Management 28 Optimization Alternatives of Information Systems for Risk Management Iulia APOSTOL-MAURER SAP Germany The focus of this article lies on synthesizing the requirements a risk management information system

More information

ERP Implementation failure at HP. Presented by: DINESH SHRISHRIMAL

ERP Implementation failure at HP. Presented by: DINESH SHRISHRIMAL ERP Implementation failure at HP Presented by: DINESH SHRISHRIMAL BACKGROUND OF HP Started in 1938 by 2 Stanford Engineers BILL HEWLETT and DAVID PACKARD as an electronic instrument company. Its first

More information

CTERA Cloud Care. Support Services. Mar 2015. Version 2.0. 2015, CTERA Networks. All rights reserved.

CTERA Cloud Care. Support Services. Mar 2015. Version 2.0. 2015, CTERA Networks. All rights reserved. CTERA Cloud Care Support Services Mar 2015 Version 2.0 2015, CTERA Networks. All rights reserved. Contents CTERA Support Services -------------------------------------------------------------------------------

More information

CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS

CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS April 2014 Cloud Conceptual Reference Model The ease of use a Cloud Consumer experiences results from a complex, behind-the-scenes, orchestration of interchangeable,

More information

This course will also teach how to create various kinds of dashboards using Reporting Services.

This course will also teach how to create various kinds of dashboards using Reporting Services. Implementing and Maintaining Microsoft SQL Server 2008 Reporting Services Length : 3 Days (24 Hours) Language(s) : English Audience(s) : IT Professionals Level : 200 Technology : Microsoft SQL Server 2008

More information

CSE 544 Principles of Database Management Systems. Magdalena Balazinska (magda) Spring 2006 Lecture 1 - Class Introduction

CSE 544 Principles of Database Management Systems. Magdalena Balazinska (magda) Spring 2006 Lecture 1 - Class Introduction CSE 544 Principles of Database Management Systems Magdalena Balazinska (magda) Spring 2006 Lecture 1 - Class Introduction Outline Introductions Class overview What is the point of a database? Course Staff

More information

HOW TO SETUP YOUR OWN CLOUD SERVER PDF

HOW TO SETUP YOUR OWN CLOUD SERVER PDF HOW TO SETUP YOUR OWN CLOUD SERVER PDF ==> Download: HOW TO SETUP YOUR OWN CLOUD SERVER PDF HOW TO SETUP YOUR OWN CLOUD SERVER PDF - Are you searching for How To Setup Your Own Cloud Server Books? Now,

More information

Product Roadmap Session 16 Nov 2011, Blijdorp Zoo Rotterdam

Product Roadmap Session 16 Nov 2011, Blijdorp Zoo Rotterdam Product Roadmap Session 16 Nov 2011, Blijdorp Zoo Rotterdam Bart van Dongen, CTO Ferry van Genderen, Head of development Mike Hoksbergen, Software Development Partner EA HR Hans Veltman, Product Manager

More information

IBM Archiving Solutions for SAP

IBM Archiving Solutions for SAP IBM Software Group IBM Why do SAP Customers Archive? 1. Continuous growth of SAP DB Growing investments into hard disk, servers, racks, backup devices... Performance of SAP servers degrade SAP system response

More information

PROJECT Domeny.tv Domeny.tv

PROJECT Domeny.tv Domeny.tv C A S E STUDY PROJECT Domeny.tv is the largest project run inside MSERWIS. The website was launched in 2003 and since then has been developed and improved practically on a daily basis. The enormity of

More information

CA Data Center Infrastructure Management r4.3: Administration Bundle

CA Data Center Infrastructure Management r4.3: Administration Bundle CA EDUCATION COURSE DESCRIPTION CA Data Center Infrastructure Management r4.3: Administration Bundle Course Overview CA Datacenter Infrastructure Management (CA DCIM) captures detailed real-time information

More information

MDM and SOA Timo Itälä T-86.5161

MDM and SOA Timo Itälä T-86.5161 MDM and SOA Timo Itälä T-86.5161 Outline Need for SOA Options for SOA Need for common master data in SOA Discovering master data Managing master data Managing external master data SOA and MDM 2 Recap:

More information

M.P. Shah Government Medical College Jamnagar Walk - In Interview for I.C.M.R. Project On 10 / 04 / 2015

M.P. Shah Government Medical College Jamnagar Walk - In Interview for I.C.M.R. Project On 10 / 04 / 2015 M.P. Shah Government Medical College Jamnagar Walk - In Interview for I.C.M.R. Project On 10 / 04 / 2015 Applications are invited for following posts on temporary basis on contract of one year, performance

More information

How To Deploy Office 2016 With Office 2016 Deployment Tool

How To Deploy Office 2016 With Office 2016 Deployment Tool How to deploy Office 2016 using SCCM 2012 R2 In this article we will see how to deploy Office 2016 using SCCM 2012 R2. Along with Office 2016, Microsoft has released office 2016 deployment tool. The Office

More information

The International Arab Journal of Information Technology, Vol. 4, No. 2, April 2007 103 : Scalable Distributed Database System Soror Sahri CERIA, Université Paris Dauphine, France Abstract: We present,

More information

ARM mbed IoT Device Platform. November 3 rd, 2014

ARM mbed IoT Device Platform. November 3 rd, 2014 ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the

More information

Dynamic Thread Pool based Service Tracking Manager

Dynamic Thread Pool based Service Tracking Manager Dynamic Thread Pool based Service Tracking Manager D.V.Lavanya, V.K.Govindan Department of Computer Science & Engineering National Institute of Technology Calicut Calicut, India e-mail: lavanya.vijaysri@gmail.com,

More information

ERP Systems. Generic ERP system. Categories of ERP systems. December 4, 2014

ERP Systems. Generic ERP system. Categories of ERP systems. December 4, 2014 ERP Systems December 4, 2014 Generic ERP system 2 Categories of ERP systems By size and complexity Enterprise grade packages Midmarket solutions Small business packages By specialization Generic packages

More information

BUS319: Introduction to Enterprise Resource Planning

BUS319: Introduction to Enterprise Resource Planning University of Wisconsin Oshkosh College of Business Administration BUS319: Introduction to Enterprise Resource Planning Fall 2013 Syllabus Instructor: Class Meeting: Office Hours: John M. Muraski MS, MBA,

More information

unified communications sourcing Making the right choice between on-premise, managed service, cloud and hybrid

unified communications sourcing Making the right choice between on-premise, managed service, cloud and hybrid unified communications sourcing Making the right choice between on-premise, managed service, cloud and hybrid On-premise, managed service, cloud or hybrid? We take a look at the reasons for choosing each

More information

Patient Satisfaction Survey Results 2011

Patient Satisfaction Survey Results 2011 Patient Satisfaction Survey Results 2011 Summary Our 2011 Patient Satisfaction survey was sent to 40 patients with 11 responses received, a response rate of 28%. As last year, the overwhelming response

More information

Citrix XenApp-7.6 Administration Training. Course

Citrix XenApp-7.6 Administration Training. Course Citrix XenApp-7.6 Administration Training Course Course Duration : 20 Working Days Class Duration : 3 hours per day Fast Track: - Course duration 10days (Per day 8 hours) Get Fee Details Module 1: Citrix

More information

8/25/2008. Chapter Objectives PART 3. Concepts in Enterprise Resource Planning 2 nd Edition

8/25/2008. Chapter Objectives PART 3. Concepts in Enterprise Resource Planning 2 nd Edition Concepts in Enterprise Resource Planning 2 nd Edition Chapter 2 The Development of Enterprise Resource Planning Systems Chapter Objectives Identify the factors that led to the development of Enterprise

More information

Tuition Reimbursement Program. Handbook

Tuition Reimbursement Program. Handbook EMPLOY EE Tuition Reimbursement Program Handbook For Employees... Ed u c a t i o n m a d e a f f o r d a b l e! A t t h e E r n e s t O r l a n d o L a w r e n c e B e r k e l e y N a t i o n a l L a b

More information

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.

Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving

More information

inforouter V8.0 Distributed versus the Simple Model

inforouter V8.0 Distributed versus the Simple Model inforouter V8.0 Distributed versus the Simple Model A guide to choosing the right model 1. T his guide will walk you through the two different installation options of inforouter and help you decide which

More information

SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD

SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE SYSTEM IN CLOUD International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol-1, Iss.-3, JUNE 2014, 54-58 IIST SOLVING LOAD REBALANCING FOR DISTRIBUTED FILE

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Deploying and Managing Windows 10 Using Enterprise Services

Deploying and Managing Windows 10 Using Enterprise Services Course 20697-2: Deploying and Managing Windows 10 Using Enterprise Services Course details Course Outline Module 1: Managing Desktops and Devices in an Enterprise Environment This module explains the most

More information

How to Setup SQL Server Replication

How to Setup SQL Server Replication Introduction This document describes a scenario how to setup the Transactional SQL Server Replication. Before we proceed for Replication setup you can read brief note about Understanding of Replication

More information

Scope. Cognescent SBI Semantic Business Intelligence

Scope. Cognescent SBI Semantic Business Intelligence Cognescent SBI Semantic Business Intelligence Scope...1 Conceptual Diagram...2 Datasources...3 Core Concepts...3 Resources...3 Occurrence (SPO)...4 Links...4 Statements...4 Rules...4 Types...4 Mappings...5

More information

88-28-6. Fees. Fees for certificates of approval, registration of representatives, and

88-28-6. Fees. Fees for certificates of approval, registration of representatives, and . Fees. Fees for certificates of approval, registration of representatives, and certain transcripts shall be collected by the state board in accordance with this regulation. (a) For institutions domiciled

More information

A networking framework for spontaneous interactions in MANETs

A networking framework for spontaneous interactions in MANETs A networking framework for spontaneous interactions in MANETs BACKGROUND AND MOTIVATIONS Promoting interactions Socializing Group wise Transforming places Ephemeral Ad hoc Minimal Application driven User

More information

Cloud & Datacenter Monitoring with System Center Operations Manager

Cloud & Datacenter Monitoring with System Center Operations Manager Page 1 of 5 Overview This course equips students with the skills they require to deploy and configure System Center 2012 R2 Operations. Using hands-on labs, students learn the following: How to architect

More information

SAP Standard Application Benchmark Publication Process. Version 2.2

SAP Standard Application Benchmark Publication Process. Version 2.2 SAP Standard Application Benchmark Publication Process Version 2.2 September 10, 2002 Copyright statement No part of this document may be reproduced or transmitted in any form or for any purpose without

More information

Do You See What I See (DYSWIS)

Do You See What I See (DYSWIS) Do You See What I See (DYSWIS) Introduction: DYSWIS is a system that leverages distributed network nodes to gather network management information for fault isolation and diagnosis. This project extends

More information

MSC Malaysia MyProCert SRI 2015 List of Certifications

MSC Malaysia MyProCert SRI 2015 List of Certifications MSC Malaysia SRI 2015 List of Certifications Reduced Fee by Technology Area Skillset Certification Financial Accounting (FI) RM22,250.00 RM7,000.00 Enterprise Resource Planning Data Science/ Big Data Security

More information

Computer Visions Course Outline

Computer Visions Course Outline www.compvisions.com 16 Corporate Woods Blvd. Albany, NY 12211 Computer Visions Course Outline Get What You Want We offer highly customizable group training courses: desktop applications, web development,

More information

ANDROID DEVELOPER RESUME USA

ANDROID DEVELOPER RESUME USA Android Developer resume usa 1 of 5 1/12/2015 2:28 PM ANDROID DEVELOPER RESUME USA.NET Developers/Architects Resumes Please note that this is a not a Job Board - We are an I.T Staffing Company and we provide

More information

Automated Performance Testing and Analysis. Armin Pruessner GAMS Development Corporation

Automated Performance Testing and Analysis. Armin Pruessner GAMS Development Corporation Automated Performance Testing and Analysis Armin Pruessner GAMS Development Corporation INFORMS Annual Meeting, San Jose Oct 17-20, 2002 Agenda 1. Performance World! Brief overview 2. Main Focus: Performance

More information

OSIRIS Middleware & ISIS Application

OSIRIS Middleware & ISIS Application OSIRIS Middleware & ISIS Application DELOS All Tasks Meeting Heiko Schuldt University of Basel, Switzerland UMIT, Austria What is OSIRIS? OSIRIS: Open Service Infrastructure for Reliable and Integrated

More information

DBTech Pro Workshop. Knowledge Discovery from Databases (KDD) Including Data Warehousing and Data Mining. Georgios Evangelidis

DBTech Pro Workshop. Knowledge Discovery from Databases (KDD) Including Data Warehousing and Data Mining. Georgios Evangelidis DBTechNet DBTech Pro Workshop Knowledge Discovery from Databases (KDD) Including Data Warehousing and Data Mining Dimitris A. Dervos dad@it.teithe.gr http://aetos.it.teithe.gr/~dad Georgios Evangelidis

More information

Digital Mobile Radio Demystified. By Don Trynor, VA3XFT November 27, 2014

Digital Mobile Radio Demystified. By Don Trynor, VA3XFT November 27, 2014 Digital Mobile Radio Demystified By Don Trynor, VA3XFT November 27, 2014 Agenda Digital Mobile Radio Overview Ham Radio Usage of DMR How to Get Started With DMR 2 What is Digital Mobile Radio? Commonly

More information