A. Grusho, N. Grusho, E. Timonina, V. Piskovski The Institute of Informatics Problems of the Russian Academy of Sciences, Non-profit Partnership
|
|
- Jonah York
- 8 years ago
- Views:
Transcription
1 A. Grusho, N. Grusho, E. Timonina, V. Piskovski The Institute of Informatics Problems of the Russian Academy of Sciences, Non-profit Partnership «Applied Research Center for Computer Networks» Moscow, Russia
2 Traditionally IT infrastructure can be presented as a connected graph GG tt = VV tt, EE tt, where VV tt IT components, EE tt interactions. We also can introduce a two kinds of topology, assigning to every host: a risk, i.e. L 1 is a measure, a kind of a norm reflecting a probability to get unauthorized access a value of data a host processes, similarly we denote it as L 2, a measure of data category
3 DMZ Back office Sharepoint SCCM Internet Mail Server RDBMS Data Center SCADA HMI HMI Equipment Operational DW segment HMI MES PLM DSC Controllers, sensors, actuators, equipment PLC Sensors
4 The norm of L 1 representing a scalar risk. A given threshold defines a subset V 1 of components. We can assume those components have got heightened risk of unsafe impact. A threshold applied to V and L 2 defines a subset V 2 of hosts or components containing valuable information needed to be protected.
5 We determine the system architecture as secure when there are no direct interactions between V 1 and V 2 elements. If there is a need in such interactions then we have to put an interface called SecS (Security Server). The Security Server is both to lower a risk of hazard effect on valuable hosts and to prevent of rising value level for risky hosts. SDN allows to recalculate norms mentioned above and to customize configurations in order to keep the architecture secure
6 It s really hard and expensive to build absolutely or assured secure architecture. As an example of systems with different levels of security we consider a PC. Also we assume the PC runs under a hypervisor with its manager and two virtual machines. A virtual machine VM1 has connected with Internet, and the other VM2 is not allowed to connect to Internet. A user can work with his confidential data on a VM2 and has to switch to VM1 in order to send these packages. Thus we can state that just described architecture is more secure in comparison of a situation when both virtual machines have been accessed to Internet.
7 VM1 VM2 Admin.OS Hypervisor
8 Data (OLAP facts) accompany with markers to estimate a value, i.e. data category BI (OLAP) procedures recalculate aggregated value markers complying with predefined rules Control Plane applications administer an access to aggregated values on-line according to users credentials and his current activity profile These applications can use AI technology to realize such a flexible security policy to guard sensitive data
9 SDN controller applications solve the problems: To get an access to the object of analysis, i.e. data flow from a web-service to a client, e.g. by men-inthe-middle Applying AI tools to analyze data flow and make a decision on its content during the period defined by technological and business requirements
10 To protect data with a usage of insecure platforms in control and data planes: 1. Split data (e.g. a text) into fragments 2. Furnish every fragment with two cryptographically protected marks 3. Store crypto keys for these marks in control plane 4. Place fragments into randomly chosen memory slices 5. Controller swiftly restores a full text as a linked list according to requested fragment
11 ... Meta data Data Access Control Controller Service of distributed data storage Request to get data Data Fragment 1... Fragment N-1 Processing data Data Fragment N... Data storage systems Fragment 1 Fragment N Fragment N-1... Private cloud... DropBox SkyDrive
12 A secure usage of cryptography depends on the quality of isolating domain with cryptographic functions running Applying specialized high performance technical means in control plane to use dissimilar crypto keys in different data flows and to carry out bulk computations at instantiating cryptographic protection of high quality
13 Thank you Questions
Network Virtualization for the Enterprise Data Center. Guido Appenzeller Open Networking Summit October 2011
Network Virtualization for the Enterprise Data Center Guido Appenzeller Open Networking Summit October 2011 THE ENTERPRISE DATA CENTER! Major Trends change Enterprise Data Center Networking Trends in the
More informationSecure Cloud Computing with FlexCloud
Department of Computer Science Institute of Systems Architecture Chair of Computer Networks Secure Cloud Computing with FlexCloud Dr.-Ing. Anja Strunk DAAD Summer School CTDS 2012 Sousse, Tunisia 07.09.2012
More informationSECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
More informationRestorable Logical Topology using Cross-Layer Optimization
פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical
More informationCloud Computing Architecture
Cloud Computing Architecture 1 1. Workload distribution architecture Scale up/down the IT resources Distribute workload among IT resource evenly 2 A variant Cloud service consumer requests are sent to
More informationHow To Manage A Virtualization Server
Brain of the Virtualized Data Center Contents 1 Challenges of Server Virtualization... 3 1.1 The virtual network breaks traditional network boundaries... 3 1.2 The live migration function of VMs requires
More informationVirtual Machine in Data Center Switches Huawei Virtual System
Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From
More informationVirtualized Networks based on System Virtualization
Virtualized Networks based on System Virtualization 2nd GI/ITG KuVS Workshop on Future Internet Karlsruhe 2008 Andreas Fischer, Andreas Berl, and Hermann de Meer Overview Network Virtualization System
More informationInHand Device Cloud Service DN 4.0 Quick Start Guide
InHand Device Cloud Service DN 4.0 Quick Start Guide Contents 1. Overview... 3 2. Device Manager... 4 2.1 Get an account by self-registration... 4 2.2 Remotely Configure Gateway and Upgrade firmware...
More informationDesigning IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop
Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Course 8036: Two days; Instructor-led Microsoft Certified Professional Exams No Microsoft Certified Professional
More informationGeorgia College & State University
Georgia College & State University Milledgeville, GA Domain Name Service Procedures Domain Name Service Table of Contents TABLE OF REVISIONS... 3 SECTION 1: INTRODUCTION... 4 1.1 Scope and Objective...
More informationHow To Build A Software Defined Data Center
Delivering the Software Defined Data Center Georgina Schäfer Sr. Product Marketing Manager VMware Calvin Rowland, VP, Business Development F5 Networks 2014 VMware Inc. All rights reserved. F5 & Vmware
More informationChapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
More informationNetwork/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
More informationUnifying the Programmability of Cloud and Carrier Infrastructure
Unifying the Programmability of Cloud and Carrier Infrastructure Mario Kind EWSDN 2014, Budapest UNIFY is co-funded by the European Commission DG CONNECT in FP7 We might only have to knit the future. Operator
More information"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
More informationMaking Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
More informationAppendix G: MAS and MSS reports
Appendix G: MAS and MSS reports Administrators can use the Reporting Tool application to generate predefined Messaging Application Server (MAS) reports. These reports are useful for monitoring system usage,
More informationUnderstanding the Business Case of Network Function Virtualization
White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building
More informationSaisei and Intel Maximizing WAN Bandwidth
Intel Network Builders Saisei Solution Brief Intel Xeon Processors Saisei and Intel Maximizing WAN Bandwidth Introduction Despite the increased capacity available on WAN links1, service providers and enterprises
More informationSchool Information Security and Privacy in the Cloud
School Information Security and Privacy in the Cloud Information Sheet and FAQ s Staying competitive in today s digital world means using technology in ways that are innovative in scope and reach. The
More informationServer Scalability and High Availability
Server Scalability and High Availability GO!Enterprise GLOBO Plc. March 2015 Copyright Notice and Usage Terms This guide is Copyright 2012 GLOBO. All Rights Reserved. Permission is granted to make and
More informationTurnkey Technologies- A Closer Look
Presentation Agenda Turnkey Technologies, Inc. introduction Understanding & Embracing The Cloud Cloud Considerations How to Pick a Hosting Strategy Licensing Options & Sample Managed Services what to look
More informationVirtualizing the SAN with Software Defined Storage Networks
Software Defined Storage Networks Virtualizing the SAN with Software Defined Storage Networks Introduction Data Center architects continue to face many challenges as they respond to increasing demands
More informationSecurity & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
More informationTrademark Notice. General Disclaimer
Trademark Notice General Disclaimer Intelligent Management, Centralized Operation & Maintenance Huawei Data Center Network Management Solution A data center is an integrated IT application environment
More informationCloud Computing Concept, Technology & Architecture
Cloud Computing Concept, Technology & Architecture Chapter 07 Cloud Computing Mechanisms 課 程 名 稱 : 雲 端 管 理 系 統 授 課 教 師 : 高 勝 助 Contents Technology mechanisms foundational to cloud platforms are covered,
More informationMS 20246C Monitoring and Operating a Private Cloud
MS 20246C Monitoring and Operating a Private Cloud Description: Days: 5 Prerequisites: This course describes how to monitor and operate a cloud with Microsoft System Center 2012 R2. This course focuses
More informationEntrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
More informationSDN: A NEW PARADIGM. Kireeti Kompella CTO, JDI
SDN: A NEW PARADIGM Kireeti Kompella CTO, JDI AGENDA What is SDN? Definition and goals of SDN Analogy with Compute Virtualization Orchestration for Agile Provisioning Unified SDN What parts of the network
More informationParallels Server 4 Bare Metal
Parallels Server 4 Bare Metal Product Summary 1/21/2010 Company Overview Parallels is a worldwide leader in virtualization and automation software that optimizes computing for services providers, businesses
More informationSecurity for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
More informationNetworking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
More informationServer Consolidation with SQL Server 2008
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
More informationPLUMgrid Open Networking Suite Service Insertion Architecture
White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid
More information1 Data Center Infrastructure Remote Monitoring
Page 1 of 7 Service Description: Cisco Managed Services for Data Center Infrastructure Technology Addendum to Cisco Managed Services for Enterprise Common Service Description This document referred to
More informationAbout this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010.
Course 10231B: Designing a Microsoft SharePoint 2010 Infrastructure OVERVIEW About this Course This 5 day ILT course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Audience Profile
More informationModule: Sharepoint Administrator
Module: Sharepoint Administrator Mode: Classroom Duration: 40 hours This course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course Outline: Module 1: Designing a Logical Architecture
More informationHIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
More informationCloud Networking Disruption with Software Defined Network Virtualization. Ali Khayam
Cloud Networking Disruption with Software Defined Network Virtualization Ali Khayam In the next one hour Let s discuss two disruptive new paradigms in the world of networking: Network Virtualization Software
More informationMonitoring and Operating a Private Cloud
Course 20246D: Monitoring and Operating a Private Cloud Page 1 of 7 Monitoring and Operating a Private Cloud Course 20246D: 4 days; Instructor-Led Introduction This course describes how to monitor and
More informationDesigning a Microsoft SharePoint 2010 Infrastructure
Designing a Microsoft SharePoint 2010 Infrastructure Course Details Course Code: Duration: Notes: 10231B 5 days This course syllabus should be used to determine whether the course is appropriate for the
More informationThe Complete Performance Solution for Microsoft SQL Server
The Complete Performance Solution for Microsoft SQL Server Powerful SSAS Performance Dashboard Innovative Workload and Bottleneck Profiling Capture of all Heavy MDX, XMLA and DMX Aggregation, Partition,
More informationVMUnify EC2 Gateway Guide
VMUnify EC2 Gateway Guide Version 2.8.1 Copyright Information This document is the exclusive property of Mindtree limited (Mindtree); the recipient agrees that they may not copy, transmit, use or disclose
More informationSimplifying the Transition to Virtualization TS17
Simplifying the Transition to Virtualization TS17 Name Sandeep Redkar Title Manager Process Solutions Date 11 th February 2015 Agenda Overview & Drivers Virtualization for Production Rockwell Automation
More informationMonitoring and Operating a Private Cloud
3 Riverchase Office Plaza Hoover, Alabama 35244 Phone: 205.989.4944 Fax: 855.317.2187 E-Mail: rwhitney@discoveritt.com Web: www.discoveritt.com Monitoring and Operating a Private Cloud Course: MS20246D
More informationTNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
More informationThe Need to Be Innovative and Agile. Bridging the IT/OT Divide Using Software-defined Solutions
The Need to Be Innovative and Agile Bridging the IT/OT Divide Using Software-defined Solutions IT & OT Think & Behave Differently IT View We run the network OT is the wild, wild west OT doesn t understand
More informationHow To Protect A Virtual Desktop From Attack
Endpoint Security: Become Aware of Virtual Desktop Infrastructures! An Ogren Group Special Report May 2011 Executive Summary Virtual desktops infrastructures, VDI, present IT with the unique opportunity
More informationOracle Database Cloud Services OGh DBA & Middleware Day
Oracle Database Cloud Services OGh DBA & Middleware Day Jan van Tiggelen Principal Sales Consultant Oracle Core Technology June 4th, 2015 Safe Harbor Statement The following is intended to outline our
More informationLecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
More informationSecuring the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
More informationSecure information storage
Secure information storage in a private cloud built upon local network resources Student Project for Large Installation Administration Master of Science in System and Network Engineering Universiteit van
More informationSoftware Defined Cloud Security Architectures
Software Defined Cloud Security Architectures Roy Campbell October 8 th 2014, AFRL, Rome, NY Towards Assured Clouds: Our Approach Concerns Software Defined Networks Virtual Machines and Virtualization
More informationSCADA and Monitoring for Solar Energy Plant
SCADA and Monitoring for Solar Energy Plant Segment: Industry Country: Thailand Author: Ranon Satitpanyapan Products: NI LabVIEW with LabVIEW Real-Time Module crio Real-Time controller 8 slot with 16 current
More informationOpenFlow/SDN for IaaS Providers
OpenFlow/SDN for IaaS Providers Open Networking Summit 2011 Stanford University Paul Lappas & Ivan Batanov The Public Cloud Our Definition Shared infrastructure operated by a service provider where no
More informationA Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
More informationTesting ARES on the GTS framework: lesson learned and open issues. Mauro Femminella University of Perugia mauro.femminella@unipg.
Testing ARES on the GTS framework: lesson learned and open issues Mauro Femminella University of Perugia mauro.femminella@unipg.it Outline What is ARES What testing on GTS? Our solution Performance evaluation
More informationIn-Network Programmability for Next-Generation personal Cloud service support: The INPUT project
In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project Constantinos Vassilakis, PhD Athens, 2/10/2015 Motivation Trend Move functionality and services to the cloud
More informationBusiness Intelligence & Product Analytics
2010 International Conference Business Intelligence & Product Analytics Rob McAveney www. 300 Brickstone Square Suite 904 Andover, MA 01810 [978] 691 8900 www. Copyright 2010 Aras All Rights Reserved.
More informationPlain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
More informationThe Internet of Everything:
The Internet of Everything: Transforming O&G Industry in the new age Serhii Konovalov O&G Engineering Executive Amazing things Happen When You Connect the Unconnected March 12th, 2015 Why Internet of Everything?
More informationData Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
More informationHOSTED CALL RECORDING SERVICES New Revenue Opportunities for Service Providers
A MIAREC WHITE PAPER HOSTED CALL RECORDING SERVICES New Revenue Opportunities for Service Providers New revenue opportunities for service providers The hosted telephony market is becoming increasingly
More informationDesigning a Microsoft SharePoint 2010 Infrastructure
Course Code: M10231 Vendor: Microsoft Course Overview Duration: 5 RRP: 1,980 Designing a Microsoft SharePoint 2010 Infrastructure Overview This five day ILT course teaches IT professionals to design and
More informationMonitoring Agent for Citrix Virtual Desktop Infrastructure Version 8.1.3. Reference IBM
Monitoring Agent for Citrix Virtual Desktop Infrastructure Version 8.1.3 Reference IBM Monitoring Agent for Citrix Virtual Desktop Infrastructure Version 8.1.3 Reference IBM Note Before using this information
More informationIT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 financial_nccoe@nist.gov This revision incorporates comments from the public. Page Use case 1 Comments
More informationBig Drivers for IT Security - 2013
Ending the information security arms race with end-to-end encryption Presenting: Jill Walsh October, 2013 Big Drivers for IT Security Consumerization of IT Device explosion; app explosion Employee demands
More informationManaging Office 365 Identities and Services 20346C; 5 Days, Instructor-led
Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led Course Description This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part
More informationUsing Data Encryption to Achieve HIPAA Safe Harbor in the Cloud
Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA
More informationVirtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
More informationProtecting your Data in a New Generation Virtual and Physical Environment
Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,
More informationISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM
ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM Domain I: Feasibility Study - identify, scope and justify the automation project Task 1: Define the preliminary scope through currently
More informationCourse 20346: Managing Office 365 Identities and Services
Course 20346: Managing Office 365 Identities and Services Overview About this course This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part in evaluating,
More informationACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
More informationStrategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security
Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities
More informationLICENSING MANAGEMENT SERIES. A Guide to Assessing Windows Server Licensing
LICENSING MANAGEMENT SERIES A Guide to Assessing Windows Server Licensing July 2010 This document provides customers of Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, and Windows Server
More informationHow To Create A Cloud Based System For Aaas (Networking)
1 3.1 IaaS Definition IaaS: Infrastructure as a Service Through the internet, provide IT server, storage, computing power and other infrastructure capacity to the end users and the service fee based on
More informationCourse 20246: Monitoring and Operating a Private Cloud
Course 20246: Monitoring and Operating a Private Cloud Type:Course Audience(s):IT Professionals Technology:Microsoft System Center Level:300 This Revision:D Delivery method: Instructor-led (classroom)
More informationThe BIg Picture. Dinsdag 17 september 2013
The BIg Picture Dinsdag 17 september 2013 2 Agenda A short historical overview on BI Current Issues Current trends Future architecture First steps to this architecture 3 MIS/EIS Data Warehouse BI Multidimensional
More informationApplying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
More informationThis presentation provides an overview of the architecture of the IBM Workload Deployer product.
This presentation provides an overview of the architecture of the IBM Workload Deployer product. Page 1 of 17 This presentation starts with an overview of the appliance components and then provides more
More informationIaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures
IaaS Cloud Architectures: Virtualized Data Centers to Federated Cloud Infrastructures Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Introduction
More informationNetwork Virtualization
Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services
More information2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment
R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI
More informationSoftware Defined Network Application in Hospital
InImpact: The Journal of Innovation Impact: ISSN 2051-6002 : http://www.inimpact.org Special Edition on Innovation in Medicine and Healthcare : Vol. 6. No. 1 : pp.1-11 : imed13-011 Software Defined Network
More informationWhite Paper on NETWORK VIRTUALIZATION
White Paper on NETWORK VIRTUALIZATION INDEX 1. Introduction 2. Key features of Network Virtualization 3. Benefits of Network Virtualization 4. Architecture of Network Virtualization 5. Implementation Examples
More informationSoftware Defined Environments
November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements
More informationLeveraging Virtualization for Higher Business Continuity within Industrial Facilities
White Paper Leveraging Virtualization for Higher Business Continuity Author: Jim Frider, Product Marketing Manager, Invensys Operations Management What s Inside: 1. Executive Summary 2. Introduction 3.
More informationSHAREPOINT ARCHITECTURE FUNDAMENTALS
CHAPTER 4 SHAREPOINT ARCHITECTURE FUNDAMENTALS Whether you re a business user, manager, architect, developer, or IT pro, you ll want to understand the fundamental structure and core terminology of SharePoint
More informationFirst experiences using SharePoint 2016 Preview running on Windows 2016 Preview and SQL 2016 Preview.
First experiences using SharePoint 2016 Preview running on Windows 2016 Preview and SQL 2016 Preview. We have some exciting times ahead. The possibilities of Windows Server 2016 look really phenomenal.
More informationDynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis
Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing
More informationSecure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com
Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. bstrongin@hytrust.com At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud
More informationSoftware Defined Exchange (SDX) and Software Defined Infrastructure Exchange (SDIX) Vision and Architecture
Software Defined Exchange (SDX) and Software Defined Infrastructure Exchange (SDIX) Vision and Architecture Tom Lehman, Brecht Vermeulen, Marshall Brinn, Niky Riga, Larry Landweber DRAFT DO NOT DISTRIBUTE
More informationWhite Paper. Next Generation Historians. Improve historical data access and analysis while reducing costs. What s Inside:
White Paper Next Generation s Author: Mike Brost, Consulting Systems Engineer, Invensys Operations Management What s Inside: 1. Introduction 2. Historical Data Types, Usage and Management Challenges 3.
More informationMaintaining HMI and SCADA Systems Through Computer Virtualization
Maintaining HMI and SCADA Systems Through Computer Virtualization Jon Reeser Systems Engineer PROFI-VISION Automation 1150 Glenlivet Drive Allentown, PA 18106 jon.reeser@profi-vision.com Thomas Jankowski
More informationCON8474 - Software-Defined Networking in a Hybrid, Open Data Center
CON8474 - Software-Defined Networking in a Hybrid, Open Data Center Krishna Srinivasan Director, Product Management Oracle Virtual Networking Ronen Kofman Director of Product Development Oracle OpenStack
More informationHybrid for SharePoint Server 2013. Search Reference Architecture
Hybrid for SharePoint Server 2013 Search Reference Architecture 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views expressed in this document, including
More informationNetwork Virtualization: A Tutorial
Network Virtualization: A Tutorial George N. Rouskas Department of Computer Science North Carolina State University http://rouskas.csc.ncsu.edu/ Network Virtualization: A Tutorial OFC 2012, March 2012
More informationAnalysis of Network Segmentation Techniques in Cloud Data Centers
64 Int'l Conf. Grid & Cloud Computing and Applications GCA'15 Analysis of Network Segmentation Techniques in Cloud Data Centers Ramaswamy Chandramouli Computer Security Division, Information Technology
More information