The usage of cloud computing technology in university environment

Size: px
Start display at page:

Download "The usage of cloud computing technology in university environment"

Transcription

1 The usage of cloud computing technology in university environment Mgr. Zuzana Priščáková, 1 doc. Ing. Ivana Rábová, Ph.D., 2 Jaromír Salák, 3 1,2 Department of informatics, Faculty of Business and Economics, Mendel university of Brno, 3 Deans office, Faculty of Forestry and Wood Technology, Mendel university of Brno, 1 zuzana.priscakova@mendelu.cz, 2 ivana.rabova@mendelu.cz, 3 jaromir.salak@mendelu.cz Abstract Cloud computing technologies are well-established in all working environments. Usage of cloud computing in university sector is only 4% from the whole usage of cloud solutions in other sectors. In this article we proposed a model of a university cloud. Students at the university use various Internet capabilities. Cloud enables users to share the data, calculations and data processing, data management services for working with data, etc. We defined an infrastructure model based on users and their devices. When we separated user accounts and user devices, we increase the data security. Key Words Cloud computing, university, virtualization, file system, data integrity, data security Introduction Cloud computing technologies are well-established in all working environments. Cloud computing provides high scalability, and thus cloud can be implemented in any environment using information technology. Substance of the cloud is virtualization of resources. This suggests that cloud applications are used at the same time by multiple users. The users connect to the cloud using the Internet. A user on the Internet can communicate with many servers at the same time and these servers exchange information among themselves (Hayes, 2008). Users communicate with each other in a faster way. Sharing of information between users improves work efficiency. Today s cloud platforms such as Microsoft and Google provide free services to students and staff at educational institutions which include , contact lists, calendars, document storage, creation and sharing documents and the ability to create websites (Sclater, 2009). However, cloud computing services could provide many of those organizations with the opportunity to continue to take advantage of new developments in IT technologies at affordable costs. Cloud Computing is likely to be an

2 attractive proposition to start-up small to medium enterprises and educational establishments. The UK s National Computing Center (NCC) estimates that SMEs can reduce the total cost of ownership of technology using hosted solutions (Microsoft, 2009). Nabil (2010) states that the university management should identify and exploit new technologies that are cost effective, so they seek the widest possible and equitable access to technology for students and staff. This article describes the suitability of a cloud for university environment. On the basis of suitability we describe how to implement a cloud with enhanced safety. Objectives and methodology In order to determine the suitability for a cloud in universities we identified some previous studies. The use of cloud computing in the university is 4% from whole usage of clouds in other sectors. The largest use is in financial services and management sectors (Tuncay, 2010). A cloud-scale intelligent infrastructure attracts, smart environments like utility computing, smart data centers, pervasive computing, automation, virtualization and intelligent networks already penetrate many spaces of our daily live (Klein, Kaefer, 2008). The main advantage of the cloud is paying fees only for the used services. Students at the university use various Internet services, such as sharing documents, videos, presentations, software, communication via , instant messaging, etc. Since the access to the cloud can be realized with a web browser, an ideal option for the students working in the university environment is just cloud technology. In general, we can say that these acts concern not only students but also academics. Cloud enables user to share data, calculations of converting data, data management services for working with data ( , chat, video, photos...). The methods to model it with the challenges like user interface, task distribution and coordination issues are explained and evaluated in (Lijun, Chna, Tse, 2008). Cloud computing infrastructures accelerated the adoption of different technological innovations in academia and its facilities and resources could be accessed by the colleges as on demand. Praveena and Betsy (2009) provided a comprehensive introduction to the application of cloud in universities. Delic and Riley (2009) assessed the current state of the Enterprise Knowledge Management and how it would turn into a more global, dependable and efficient infrastructure namely cloud computing. Colleges and universities are always on the lookout to upgrade their software and IT hardware in order to attract students and keep pace with the rapid developments in digital technologies. Cloud computing could provide those institutions with the means to achieve those ambitions at prices they can afford.

3 Furthermore, shifting responsibility to external providers for managing some aspects of their software and hardware infrastructures could also result in cost savings with relation to labor, as fewer IT services staff will be needed than before. Tuncay (2010) established a model that seeks to meet the needs of administrative staff (student affairs, finance and accounting, purchasing and procurement etc.) and education, training and research related to the needs of students and academics working especially in educational institutions. The model is based on a cloud infrastructure, which was divided into blocks: user, network, storage, virtualization, processor, data storage, security, business continuity and firewall. Model points to improve the possibilities of data mining and search their contents. From the student perspective, the model is constructed so that it does not limit the subjects or schools and the content was changed dynamically on a regular basis. User services in this case are linked to third-party commercial services to create new applications. Since the model is quite general, we decided to focus on data security in storing data in the cloud. 1: Required infrastructure model (Tuncay, 2010) The most important feature of various applications offered through a cloud is their availability and scalability (Tuncay, 2010). User friendly interfaces of cloud based applications enable users to successfully enlarge their computing environment. A cloud-based platform planned by (Erickson, 2009) places the application-content, rather than applications themselves, to the center of interest. Cloud content (scientific and social subjects, art, opinions, textbooks, encyclopedias, etc.) is controlled by the service providers and is available to the users whenever they request (Tuncay, 2010). Improved data mining techniques filter and find the requested content in order to help the students (Fig. 2). Student s objectives are not limited to their courses or schools, hence existing content should be changed dynamically and frequently (Tuncay, 2010). Custom services are combined with 3rd party commercial services to create new applications (Tuncay, 2010).

4 2: Required application model (Tuncay, 2010) According to Sosinsky (2011) data stored in the cloud can be considered quite attractive form of outsourcing focused on daily data management. Winkler (2011) advises causes of maintaining the great responsibility of cloud services, some basic best practices for the use of secure data storage to the cloud, as well as the methods and standards for monitoring the integrity of the data regardless of data storage. Erl, Puttini and Mahmood (2013) addresse the creation of a secure storage repository specializing correct with respect to its environment (company, university, etc.) and features (although there are hundreds of cloud storage, each storage site is oriented to other requirements, such as Lim, Coolidge and Hourani (2013) division to store communications by , storage employee profiles, documentation storage projects, etc.). Of course, requirement may also store all types of documents. When saving the data to the cloud end user assumes that the data (or application, which works in a virtualized environment) is properly secured. Data integrity is critical for every data center. Monitoring the integrity of the cloud is necessary in order to store the data in a virtualized environment. The data corruption can occur at any level of storage. Marsh (2013) mentioned among the main causes of data corruption bit rot (weakening or loss of bits of data on storage media), regulator failure and damage to the deduplication metadata. Unfortunately, a side effect is that if the deduplication corrupted file, the block or bit affects all parts of the data associated linked to those metadata. The truth is that the data corruption can occur anywhere in the storage environment. Results Based on the above mentioned facts, we have compiled a model university infrastructure cloud (Fig.1). This model meets needs of the administrative staff, such as students, professors, accountants etc. Separation of user devices increased security against data theft. Every data

5 storage device is controlled through a port. Infrastructure scales up and down quickly in order to meet the demand. 3: A model of a cloud infrastructure in a university For virtualization we can use virtualization technology for servers such as KVM technology, VMware, Citrix etc. University firewall is the first instance protecting from theft of the data. The main data security is in the Security, data integrity field. For communication between people in the university is Continuity between personal of university. For storage, we created a data repository (Storage Resources and Data Resources). The data repository communicates with Security field for enhance the security of stored data. To deal with data security and integrity in a virtualized environment, we decided to use the file system ZFS The Z file system. ZFS is a file system, originally developed by Sun Microsystems Solaris Operating System. A key feature is the integration of the concepts of file system and volume management. Implementation of the Solaris ZFS is open source licensed under the CDDL (Ayad, Dippel, 2011). ZFS is designed to maximize data integrity, data, images, multiple copies of data and checksums (Ayad, Dippel, 2011). It uses data replication software model, known as RAID Z (RAID is a collective term denoting various data storage scheme using multiple disks for distribution or replication of data between disks). RAID Z provides redundant hardware like RAID, but is designed to prevent the entry of data corruption and overcome some limitations of hardware RAID (Rouse, 2007). ZFS is based on virtual data areas called the zpools. The zpool, which forms the basis of ZFS, may consist of a number of physical devices. Zpool consists from virtual machines (vdevs), which in turn are composed of block devices as files, partitions, or actual physical devices (Ayad, Dippel,

6 2011). Block devices in the vdev may be configured in different ways depending on the needs and available space. Dynamic load balancing (Dynamic striping) maximizes the throughput of the system by the addition of new physical disk it automatically moves part of the data and thus lightens the other disks from service operations over the given data (Ayad, Dippel, 2011). ZFS tries to ensure optimal load distribution by data transfers between physical devices. The handling systems ZFS file systems (partitioned) are much simpler than the conventional file systems. Instead of physical movement amounts of data are largely implemented as modifications to the appropriate references. Time and complexity of creating a new partition in the ZFS is approximately equivalent to creating a new directory in some common file systems. We solved virtualization of the server with implementation KVM technology. We chose this technology because it s cost free. KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware containing virtualization extensions (Intel VT or AMD-V). It consists of a loadable kernel module, kvm.ko, that provides the core virtualization infrastructure and a processor specific module, kvm-intel.ko or kvm-amd.ko. KVM also requires a modified QEMU although work is underway to get the required changes upstream. Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc. Discussion and conclusion Data security can be defined as the confidentiality and integrity of data processed by the organization (Erl, Puttini, Mahmoud, 2013). In the section Results we presented a proposal for implementation of a university cloud. Based on the available alternatives we have compiled an infrastructure model of a cloud. This model is based on increased data security through data integrity. To ensure data integrity we used ZFS file system. With ZFS file system we divided virtualized data to zpools. In order to reduce the cost of the university cloud we chose KVM technology. This technology provides all the capabilities for working with university data. In this article we showed how to implement a cloud for the university. References AYAD, A., DIPPEL, U., 2011: Toward Virtual Machines High Availability: ZFS and Multi- Agent System. US: LAP LAMBERT. ISBN

7 HAYES, B., 2008: Cloud computing. Communications of the ACM, 51 (7), pp DELIC, K. A., RILEY, J. A., 2009: Enterprise Knowledge Clouds: Next Generation KM Systems? International Conference on Information, Process, and Knowledge Management, Cancun, MEXICO, pp ERIKSON, J. S., SPENCE, S., RHODES, M., BANKS, D., RUTHERFORD, J., SIMPSON, E., 2009: Content-Centered Collaboration Spaces in the Cloud. IEEE Internet Computing, pp ERL, T., PUTTINI. R., MAHMOOD. Z., 2013: Cloud Computing: Concepts, Technology & Architecture. USA: Prentice Hall. ISBN KLEIN, C., KAEFER, G., 2008: From smart homes to smart cities: Opportunities and challenges from an industrial perspective, Next Generation Teletraffic and Wired/Wireless Advanced Networking, Proceedings, Lecture Notes in Computer Science, 5174, 260. LIJUN, M., CHAN, W.K., TSE, T.H., 2008: A tale of clouds: Paradigm comparisons and some thoughts on research issues. IEEE Asia-Pasific Services Computing Conference, APSCC 08, pp LIM, I., COOLIDGE. E., HOURANI. P., 2013: Securing Cloud and Mobility: A Practitioner s Guide. USA: CRC Press. ISBN MARSH, CH., 2011: Data Integrity in the Cloud. Computer Technology: Review. [cit ]. Cited from MICROSOFT, 2009: SME role for cloud computing. [cit ]. Cited from NABIL, S., 2010: Cloud computing for education: A new dawn? International Journal of Information Management. London: Elsevier. PRAVEENA, K., BETSY T., 2009: Application of Cloud Computing in Academia. IUP Journal of Systems Management, 7 (3), pp ROUSE, M., 2007: RAID (Redundant array of independent disks). TechTarget. [cit ]. Cited from:

8 SCLATER, N., 2009: Cloudworks, elearning in the Cloud. [cit ]. Cited from SOSINSKY, B., 2011: Cloud Computing Bible. USA:John Wiley and Sons. ISBN TUNCAY, E., 2010: Effective use of cloud computing in educational institutions. Procedia: Social and Behavioral Science. pp WINKLER, V., 2011: Securing the Cloud. USA:Syngress. ISBN

Effective use of cloud computing in educational institutions

Effective use of cloud computing in educational institutions Available online at www.sciencedirect.com Procedia Social and Behavioral Sciences 2 (2010) 938 942 WCES-2010 Effective use of cloud computing in educational institutions Tuncay Ercan a * a Yasar University,

More information

MODEL OF SOLUTIONS FOR DATA SECURITY IN CLOUD COMPUTING

MODEL OF SOLUTIONS FOR DATA SECURITY IN CLOUD COMPUTING MODEL OF SOLUTIONS FOR DATA SECURITY IN CLOUD COMPUTING Zuzana Priščáková 1 and Ivana Rábová 2 1 Department of Informatics, Mendel University, Brno, Czech Republic zuzana.priscakova@hotmail.com 2 Department

More information

Applications' of Cloud Computing in Academic Institutions

Applications' of Cloud Computing in Academic Institutions Applications' of Cloud Computing in Academic Institutions Muhammad Mannir Ahmad Getso University of East London Kuala Lumpur Malaysia manniru@gmail.com Riyaz Ahmed A. H. School of Engineering & Computing

More information

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 8, February 2015

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 8, February 2015 The Research for Using Some Opportunities of Cloud Computing in Distance-Learning (module of State University of Agriculture in Mongolia) Bat-Erdene Nyandag 1 1 Department of Computer Sciences, Inner Mongolia

More information

ONLINE BUSINESS MANAGEMENT USING HYBRID CLOUD

ONLINE BUSINESS MANAGEMENT USING HYBRID CLOUD ONLINE BUSINESS MANAGEMENT USING HYBRID CLOUD Vanaja Gokul, Venkatesh.G, Vignesh.B and GowriShankar.M Department of Computer Science & Engineering, Sri Venkateswara College of Engineering, Sriperumbudur,

More information

StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud

StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud StACC: St Andrews Cloud Computing Co laboratory A Performance Comparison of Clouds Amazon EC2 and Ubuntu Enterprise Cloud Jonathan S Ward StACC (pronounced like 'stack') is a research collaboration launched

More information

An E-learning System Architecture based on Cloud Computing

An E-learning System Architecture based on Cloud Computing An E-learning System Architecture based on Cloud Computing Md. Anwar Hossain Masud, Xiaodi Huang Abstract The massive proliferation of affordable computers, Internet broadband connectivity and rich education

More information

A quantitative comparison between xen and kvm

A quantitative comparison between xen and kvm Home Search Collections Journals About Contact us My IOPscience A quantitative comparison between xen and kvm This content has been downloaded from IOPscience. Please scroll down to see the full text.

More information

A Quality Model for E-Learning as a Service in Cloud Computing Framework

A Quality Model for E-Learning as a Service in Cloud Computing Framework A Quality Model for E-Learning as a Service in Cloud Computing Framework Dr Rajni Jindal Professor, Department of IT Indira Gandhi Institute of Technology, New Delhi, INDIA rajnijindal@dce.ac.in Alka Singhal

More information

VMware Server 2.0 Essentials. Virtualization Deployment and Management

VMware Server 2.0 Essentials. Virtualization Deployment and Management VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.

More information

Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize

Server and Storage Virtualization. Virtualization. Overview. 5 Reasons to Virtualize Server and Storage Virtualization. Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at:

More information

Enterprise Content Management and cloud decision process

Enterprise Content Management and cloud decision process Enterprise Content Management and cloud decision process Bc. Ing. Jaroslava Klegová, doc. Ing. Ivana Rábová, Ph.D., Department of Informatics, Mendel University in Brno, Zemědělská 1, 613 00 Brno, Czech

More information

How To Make A Virtual Machine Aware Of A Network On A Physical Server

How To Make A Virtual Machine Aware Of A Network On A Physical Server VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization

More information

Virtualization in Linux a Key Component for Cloud Computing

Virtualization in Linux a Key Component for Cloud Computing Virtualization in Linux a Key Component for Cloud Computing Harrison Carranza a and Aparicio Carranza a a Computer Engineering Technology New York City College of Technology of The City University of New

More information

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION

CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 1 E N D U R A D A T A EDpCloud: A File Synchronization, Data Replication and Wide Area Data Distribution Solution CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 2 Resilient

More information

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu

Lecture 2 Cloud Computing & Virtualization. Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Lecture 2 Cloud Computing & Virtualization Cloud Application Development (SE808, School of Software, Sun Yat-Sen University) Yabo (Arber) Xu Outline Introduction to Virtualization The Major Approaches

More information

Hitachi Storage Solution for Cloud Computing

Hitachi Storage Solution for Cloud Computing Storage Solution for Cloud Computing Virtual Storage Platform Review Vol. 61 (2012), No. 2 85 Tsutomu Sukigara Naoko Kumagai OVERVIEW: With growing interest in cloud computing driven by major changes in

More information

Analysis of Cloud Solutions for Asset Management

Analysis of Cloud Solutions for Asset Management ICT Innovations 2010 Web Proceedings ISSN 1857-7288 345 Analysis of Cloud Solutions for Asset Management Goran Kolevski, Marjan Gusev Institute of Informatics, Faculty of Natural Sciences and Mathematics,

More information

Open-E Data Storage Software and Intel Modular Server a certified virtualization solution

Open-E Data Storage Software and Intel Modular Server a certified virtualization solution Open-E Data Storage Software and Intel Modular Server a certified virtualization solution Contents 1. New challenges for SME IT environments 2. Open-E DSS V6 and Intel Modular Server: the ideal virtualization

More information

E-learning and Cloud Computing

E-learning and Cloud Computing Review Article CLOUD BASED MODEL FOR E-LEARNING IN HIGHER EDUCATION Prof. Swati Vitkar Address for Correspondence Research scholar, JJT University, Rajasthan ABSTRACT- The nature of the Internet was constantly

More information

Review Paper on E-learning Using Cloud Computing

Review Paper on E-learning Using Cloud Computing Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1281

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Benefit of Cloud Computing for Educational Institutions and Online Marketing

Benefit of Cloud Computing for Educational Institutions and Online Marketing Information Security and Computer Fraud, 2014, Vol. 2, No. 1, 5-9 Available online at http://pubs.sciepub.com/iscf/2/1/2 Science and Education Publishing DOI:10.12691/iscf-2-1-2 Benefit of Cloud Computing

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Full and Para Virtualization

Full and Para Virtualization Full and Para Virtualization Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF x86 Hardware Virtualization The x86 architecture offers four levels

More information

An Affordable Commodity Network Attached Storage Solution for Biological Research Environments.

An Affordable Commodity Network Attached Storage Solution for Biological Research Environments. An Affordable Commodity Network Attached Storage Solution for Biological Research Environments. Ari E. Berman, Ph.D. Senior Systems Engineer Buck Institute for Research on Aging aberman@buckinstitute.org

More information

Performance analysis and comparison of virtualization protocols, RDP and PCoIP

Performance analysis and comparison of virtualization protocols, RDP and PCoIP Performance analysis and comparison of virtualization protocols, RDP and PCoIP Jiri Kouril, Petra Lambertova Department of Telecommunications Brno University of Technology Ustav telekomunikaci, Purkynova

More information

On Demand Satellite Image Processing

On Demand Satellite Image Processing On Demand Satellite Image Processing Next generation technology for processing Terabytes of imagery on the Cloud WHITEPAPER MARCH 2015 Introduction Profound changes are happening with computing hardware

More information

Data Backups in the Clouds

Data Backups in the Clouds ELEKTROTEHNIŠKI VESTNIK 78(3): 118-122, 2011 ENGLISH EDITION Data Backups in the Clouds Aljaž Zrnec University of Ljubljana, Faculty of Computer and Information Science, Trzaska 25, 1000 Ljubljana, Slovenia

More information

Scala Storage Scale-Out Clustered Storage White Paper

Scala Storage Scale-Out Clustered Storage White Paper White Paper Scala Storage Scale-Out Clustered Storage White Paper Chapter 1 Introduction... 3 Capacity - Explosive Growth of Unstructured Data... 3 Performance - Cluster Computing... 3 Chapter 2 Current

More information

Driving the New Paradigm of Software Defined Storage Solutions White Paper July 2014

Driving the New Paradigm of Software Defined Storage Solutions White Paper July 2014 Sanapptx Driving the New Paradigm of Software Defined Storage Solutions White Paper July 2014 Page 1 The New Software Defined Storage Opportunity Organizations everywhere are experiencing an explosion

More information

ZFS Administration 1

ZFS Administration 1 ZFS Administration 1 With a rapid paradigm-shift towards digital content and large datasets, managing large amounts of data can be a challenging task. Before implementing a storage solution, there are

More information

Role of Cloud Computing in Education

Role of Cloud Computing in Education Role of Cloud Computing in Education Kiran Yadav Assistant Professor, Dept. of Computer Science. Govt. College for Girls, Gurgaon, India ABSTRACT: Education plays an important role in maintaining the economic

More information

Open Source Cloud Software Made in Switzerland. Michael Eichenberger CEO stepping stone GmbH Open Cloud Day 19th of June 2012

Open Source Cloud Software Made in Switzerland. Michael Eichenberger CEO stepping stone GmbH Open Cloud Day 19th of June 2012 Open Source Cloud Software Made in Switzerland Michael Eichenberger CEO stepping stone GmbH Open Cloud Day 19th of June 2012 Agenda About us Why our own Cloud solution? Technology Distinctive Features

More information

Clustering Windows File Servers for Enterprise Scale and High Availability

Clustering Windows File Servers for Enterprise Scale and High Availability Enabling the Always-On Enterprise Clustering Windows File Servers for Enterprise Scale and High Availability By Andrew Melmed Director of Enterprise Solutions, Sanbolic, Inc. April 2012 Introduction Microsoft

More information

Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database

Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database JIOS, VOL. 35, NO. 1 (2011) SUBMITTED 02/11; ACCEPTED 06/11 UDC 004.75 Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database University of Ljubljana Faculty of Computer and Information

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

Protecting your Data in a New Generation Virtual and Physical Environment

Protecting your Data in a New Generation Virtual and Physical Environment Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,

More information

Very Large Enterprise Network Deployment, 25,000+ Users

Very Large Enterprise Network Deployment, 25,000+ Users Very Large Enterprise Network Deployment, 25,000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

More information

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

White Paper. Low Cost High Availability Clustering for the Enterprise. Jointly published by Winchester Systems Inc. and Red Hat Inc.

White Paper. Low Cost High Availability Clustering for the Enterprise. Jointly published by Winchester Systems Inc. and Red Hat Inc. White Paper Low Cost High Availability Clustering for the Enterprise Jointly published by Winchester Systems Inc. and Red Hat Inc. Linux Clustering Moves Into the Enterprise Mention clustering and Linux

More information

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential

More information

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops

More information

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business

More information

Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution

Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution Jonathan Halstuch, COO, RackTop Systems JHalstuch@racktopsystems.com Big Data Invasion We hear so much on Big Data and

More information

The Art of Virtualization with Free Software

The Art of Virtualization with Free Software Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike

More information

Pre-scheduled Control of Online Device-Based Backup and Incremental Data Backup in VMware Virtual System Environment

Pre-scheduled Control of Online Device-Based Backup and Incremental Data Backup in VMware Virtual System Environment X Triennial International SAUM Conference on Systems, Automatic Control and Measurements Niš, Serbia, November 10 th -12 th, 2010 Pre-scheduled Control of Online Device-Based Backup and Incremental Data

More information

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer

More information

Very Large Enterprise Network, Deployment, 25000+ Users

Very Large Enterprise Network, Deployment, 25000+ Users Very Large Enterprise Network, Deployment, 25000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

Virtualization of Wireless LAN Infrastructures

Virtualization of Wireless LAN Infrastructures Virtualization of Wireless LAN Infrastructures IDAACS 2011 IEEE 6th International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 15-17 September 2011,

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

ORACLE DATABASE 10G ENTERPRISE EDITION

ORACLE DATABASE 10G ENTERPRISE EDITION ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.

More information

Investigation of Cloud Computing: Applications and Challenges

Investigation of Cloud Computing: Applications and Challenges Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,

More information

Multi-level Metadata Management Scheme for Cloud Storage System

Multi-level Metadata Management Scheme for Cloud Storage System , pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1

More information

2) Xen Hypervisor 3) UEC

2) Xen Hypervisor 3) UEC 5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools

More information

IBM Lotus Instant Messaging and Web Conferencing 6.5.1

IBM Lotus Instant Messaging and Web Conferencing 6.5.1 Provides instant, anytime access to people and information IBM Lotus Instant Messaging and Web Conferencing 6.5.1 Highlights Optimizes collaboration and Accelerates time to market human interaction by

More information

Efficient Load Balancing using VM Migration by QEMU-KVM

Efficient Load Balancing using VM Migration by QEMU-KVM International Journal of Computer Science and Telecommunications [Volume 5, Issue 8, August 2014] 49 ISSN 2047-3338 Efficient Load Balancing using VM Migration by QEMU-KVM Sharang Telkikar 1, Shreyas Talele

More information

Enterprise Network Deployment, 10,000 25,000 Users

Enterprise Network Deployment, 10,000 25,000 Users Enterprise Network Deployment, 10,000 25,000 Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

Best Practices for Deploying Citrix XenDesktop on NexentaStor Open Storage

Best Practices for Deploying Citrix XenDesktop on NexentaStor Open Storage Best Practices for Deploying Citrix XenDesktop on NexentaStor Open Storage White Paper July, 2011 Deploying Citrix XenDesktop on NexentaStor Open Storage Table of Contents The Challenges of VDI Storage

More information

Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60

Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60 International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid

More information

Server and Storage Virtualization

Server and Storage Virtualization Server and Storage Virtualization. Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides and audio/video recordings of this class lecture are at: 7-1 Overview

More information

Nexenta Performance Scaling for Speed and Cost

Nexenta Performance Scaling for Speed and Cost Nexenta Performance Scaling for Speed and Cost Key Features Optimize Performance Optimize Performance NexentaStor improves performance for all workloads by adopting commodity components and leveraging

More information

Silver Peak s Virtual Acceleration Open Architecture (VXOA)

Silver Peak s Virtual Acceleration Open Architecture (VXOA) Silver Peak s Virtual Acceleration Open Architecture (VXOA) A FOUNDATION FOR UNIVERSAL WAN OPTIMIZATION The major IT initiatives of today data center consolidation, cloud computing, unified communications,

More information

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance Intel Xeon processor Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance The easy solution for backup to disk with deduplication Intel Inside. Powerful Solution Outside. If

More information

NLSS: A Near-Line Storage System Design Based on the Combination of HDFS and ZFS

NLSS: A Near-Line Storage System Design Based on the Combination of HDFS and ZFS NLSS: A Near-Line Storage System Design Based on the Combination of HDFS and Wei Hu a, Guangming Liu ab, Yanqing Liu a, Junlong Liu a, Xiaofeng Wang a a College of Computer, National University of Defense

More information

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS

CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS Jonas Software, March 2013 Contents Introduction... 3 Hardware Specifications... 4 Recommended Server Hardware Specifications... 4 Recommended Workstation

More information

RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA

RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA RESEARCH PAPERS FACULTY OF MATERIALS SCIENCE AND TECHNOLOGY IN TRNAVA SLOVAK UNIVERSITY OF TECHNOLOGY IN BRATISLAVA 2015 Volume 23, Special Number HYPERVISOR FOR VIRTUALIZATION IN PRIVATE CLOUD Pavol ZÁVACKÝ,

More information

Computing Service Provision in P2P Clouds

Computing Service Provision in P2P Clouds Computing Service Provision in P2P Clouds Ghislain FOUODJI TASSE Supervisor: DR. Karen BRADSHAW Department of Computer Science Rhodes University Research Statement Leverage advantages of cloud computing

More information

IBM Spectrum Protect in the Cloud

IBM Spectrum Protect in the Cloud IBM Spectrum Protect in the Cloud. Disclaimer IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding

More information

2011 Cloud Computing Outlook Survey Results

2011 Cloud Computing Outlook Survey Results SPECIAL REPORT 2011 Cloud Computing Outlook Survey Results Executive Summary... 2 Introduction... 3 I. Participant Background... 5 II. IT Infrastructure Background... 6 III. Cloud Computing Preferences...

More information

Education Developmental Transformation (EDT)

Education Developmental Transformation (EDT) Cloud Computing and Sustainable Development in Higher Education 1 Sunday A. Idowu, 2 Adenike.O.Osofisan 1 Babcock University, Ilishan-Remo, Nigeria 2 University of Ibadan, Ibadan, Nigeria ABSTRACT Sustainable

More information

Cloud Sure - Virtual Machines

Cloud Sure - Virtual Machines Cloud Sure - Virtual Machines Maximize your IT network The use of Virtualization is an area where Cloud Computing really does come into its own and arguably one of the most exciting directions in the IT

More information

2010 Virtualization and Cloud Computing Survey

2010 Virtualization and Cloud Computing Survey SPECIAL REPORT Executive Summary... 2 Introduction... 3 Methodology... 3 Sample... 3 About Zenoss, Inc.... 3 2010 Virtualization and Cloud Computing Usage... 4 2010 Virtualization and Cloud Computing Survey

More information

IOS110. Virtualization 5/27/2014 1

IOS110. Virtualization 5/27/2014 1 IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows

More information

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com IJCSIT, Volume 1, Issue 5 (October, 2014) e-issn: 1694-2329 p-issn: 1694-2345 A STUDY OF CLOUD COMPUTING MODELS AND ITS FUTURE Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India

More information

SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE. When you can do it simply, you can do it all.

SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE. When you can do it simply, you can do it all. SYMANTEC NETBACKUP APPLIANCE FAMILY OVERVIEW BROCHURE When you can do it simply, you can do it all. SYMANTEC NETBACKUP APPLIANCES Symantec understands the shifting needs of the data center and offers NetBackup

More information

CONTRIBUTION OF CLOUD SERVICE PROVIDERS TO EDUCATION

CONTRIBUTION OF CLOUD SERVICE PROVIDERS TO EDUCATION CONTRIBUTION OF CLOUD SERVICE PROVIDERS TO EDUCATION 1 O. J. OZURUMBA, 2 A. ALSADOON, 3 P.W.C. PRASAD, 4 L. PHAM, 5 A. BEG 1,2,3,4 School of Computing and Mathematics, Charles Sturt University, Sydney,

More information

An E-learning System Architecture based on Cloud Computing

An E-learning System Architecture based on Cloud Computing An E-learning System Architecture based on Cloud Computing Md. Anwar Hossain Masud, Xiaodi Huang Abstract The massive proliferation of affordable computers, Internet broadband connectivity and rich education

More information

5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007

5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007 5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007 Course Number: 5053A Course Length: 3 Days Course Overview This three-day instructor-led course provides students with the

More information

Sage CRM Technical Specification

Sage CRM Technical Specification Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while the document refers to Sage

More information

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE

PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE PERFORMANCE ANALYSIS OF KERNEL-BASED VIRTUAL MACHINE Sudha M 1, Harish G M 2, Nandan A 3, Usha J 4 1 Department of MCA, R V College of Engineering, Bangalore : 560059, India sudha.mooki@gmail.com 2 Department

More information

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features

Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot...

More information

Services of Cloud Computing Kanusu Srinivasa Rao 2 Assistant Professor Department of MCA Yogi Vemana University Kadapa, AP India

Services of Cloud Computing Kanusu Srinivasa Rao 2 Assistant Professor Department of MCA Yogi Vemana University Kadapa, AP India Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Ratna Kumari

More information

Third Party Cloud Services Its Adoption in the New Age

Third Party Cloud Services Its Adoption in the New Age Solutions for higher performance! Third Party Cloud Services Its Adoption in the New Age 1 Introduction Cloud computing is the delivery of computing services over the Internet. Cloud services allow individuals

More information

Optimal Planning Software Platform Development with Cloud Computing Technology

Optimal Planning Software Platform Development with Cloud Computing Technology Optimal Planning Software Platform Development with Cloud Computing Technology Anton Shabaev, Vladimir Kuznetsov, Dmitry Kositsyn Petrozavodsk State University (PetrSU) Petrozavodsk, Russia {ashabaev,

More information

Open Source Virtualization

Open Source Virtualization Open Source Virtualization About Me Dan Deighton CISSP, CISA, RHCE,... Co-founder of Aplura ddeighton@aplura.com Agenda Overview of Open Source Virtualization Real World Example Tips, Tricks and Gotchas

More information

Sage CRM Technical Specification

Sage CRM Technical Specification Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while this document refers to Sage

More information

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have

More information

Enabling Technologies for Distributed Computing

Enabling Technologies for Distributed Computing Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies

More information

" " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " " Datto Makes Virtual Hybrid Cloud Backup Easy! Product Analysis!

                                  Datto Makes Virtual Hybrid Cloud Backup Easy! Product Analysis! ! Product Analysis! Datto Makes Virtual Hybrid Cloud Backup Easy! Prepared by: Colm Keegan, Senior Analyst! Prepared: October 2014 Datto Makes Virtual Hybrid Cloud Backup Easy Many businesses and service

More information

city cloud - the leading kvm based iaas in europe

city cloud - the leading kvm based iaas in europe city cloud - the leading kvm based iaas in europe How City Network created one of the leading IaaS in Europe using KVM and op5 Author: Özgür Bal - City Network Andreas Månsson - op5 AB 2014 Content Executive

More information

Nimble Storage Replication

Nimble Storage Replication Nimble Storage Replication Nimble Storage Replication Our service provides Disaster Recovery for customers who are using Nimble Storage for their environment. Webhosting.net leverages Nimble's volume replication

More information

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers

CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies. Virtualization of Clusters and Data Centers CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 4 Virtualization of Clusters and Data Centers Text Book: Distributed and Cloud Computing, by K. Hwang, G C. Fox, and J.J. Dongarra,

More information

Cloud Computing - Architecture, Applications and Advantages

Cloud Computing - Architecture, Applications and Advantages Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral

More information

Comparing Virtualization Technologies

Comparing Virtualization Technologies CHAPTER 2 Comparing Virtualization Technologies With this chapter, we begin our exploration of several popular virtualization strategies and explain how each works. The aim is to bring you the operational

More information

DISTRIBUTED COMPUTER SYSTEMS CLOUD COMPUTING INTRODUCTION

DISTRIBUTED COMPUTER SYSTEMS CLOUD COMPUTING INTRODUCTION DISTRIBUTED COMPUTER SYSTEMS CLOUD COMPUTING INTRODUCTION Dr. Taieb Znati Computer Science Department University of Pittsburgh Fall 2014 Thoughts on Cloud Computing A way to increase capacity or add capabilities

More information

How to choose the right RAID for your Dedicated Server

How to choose the right RAID for your Dedicated Server Overview of RAID Let's first address, "What is RAID and what does RAID stand for?" RAID, an acronym for "Redundant Array of Independent Disks, is a storage technology that links or combines multiple hard

More information

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late.

BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS. Disasters happen. Don t wait until it s too late. BACKUP ESSENTIALS FOR PROTECTING YOUR DATA AND YOUR BUSINESS Disasters happen. Don t wait until it s too late. OVERVIEW It s inevitable. At some point, your business will experience data loss. It could

More information