PRPL: A Virtual Data System. Monica Lam Stanford University
|
|
|
- Ruby Cain
- 10 years ago
- Views:
Transcription
1 PRPL: A Virtual Data System Monica Lam Stanford University
2 Vision servers data Internet PC,TV at home, on the road, in hotels, on the plane Personalize the generic PC, borrow the power, display, keyboard, memory, etc My key, cache, window into my digital ID, digital personality, digital assets, and the internet
3 Background: First Approximation LivePCs Internet User Data Collective project, Moka5 LivePCs: managed virtual machines in the cloud
4 Cloud Computing Today big brother portals local private data Big-brother portals: gmail, yahoo mail, flickr Easy to use, free, quick software updates They own our data monetize via advertisement Centralized facility to service many small groups Requires a lot of resources to scale the services Low resolution photos But hardware is cheap!
5 Two Tiers Three Tiers big brother portals private public data local private data Data infrastructure Separate ownership from storage vendors & application providers (Caching) on home servers, with data backup provided by the ISPs Computation infrastructure Provide backup computation for cell phones at a nearby server Service the long-tail of distributed applications Fluidity across devices Data and computation caching in the hierarchy
6 Infrastructure for Three-Tiered Applications Openness: protection against mobile code Protection against design / coding errors Data leakage, fault containment Good user experience on a handheld Energy efficiency Distributed, location-aware applications
7 Research Strategy Collaboration: Whole system design Computation server cache in network Unifying principles cross domains Information tracking Inspirations across domains New data system new user interfaces Combines clean-slate and pragmatic thinking Inter-operability with existing infrastructure Hard-core science + usability Distributed file systems (read-only sharing) Encryption that supports sharing End-to-end development from application to networking Education Paul Kim Applications Leo Guibas Security HCI Scott Klemmer Dan Boneh Languages John Mitchell Monica Lam Distributed Systems David Mazieres OS Phil Levis Mendel Rosenblum Architecture Christos Kozyrakis Economics Ramesh Johari Guru Parulkar Nick McKeown Networking Fouad Tobagi Andrea Goldschmidt Radio Arogyaswami Paulraj
8 Potential Contributions Disruptive system architecture concepts Healthy competition with long-tail services Fundamental computer science technology for the masses Standards: web browsers, Android II. Tools and frameworks for existing systems Cross-domain innovations human resources and courses Innovative applications
9 Examples of Success Scenarios Secure communication with banks and health-care providers Personal virtual living rooms a la Second Life for families/groups Create a social network of their choice Share large amounts of data and code safely. Perfect recall from our phone All our experiences can be saved, Reddy 1997 Locate a photo from 15 years ago
10 PRPL: Virtual Data System
11 Do you know where your data are? NFS, AFS, coda CVS, SVN Samba Distributed file systems Single-image view Too hard to deploy & use Cached on different devices Online and offline access Fine-grain sharing Information hidden in attachments Why application-specific synchronization?
12 Do you know where your data are? NFS, AFS, coda CVS, SVN Samba Social networks: Large-scale sharing Data are distributed by apps Control over our data Control over our social relations No offline access The rich gets richer scheme Browser & mail clients Mega web-access programs Must secure against data leakage Common problem Data navigation on the cell phone
13 PRPL: PRivate-PubLic data index NFS, AFS, CVS, SVN Samba A unified view of data Separate data ownership, storage, applications Secure, fine-grain sharing Device-independence: caching Interactive data navigation with semantic-web queries
14 Key Technologies PRPL data appliance Individual mini file server, http server, imap server, web crawler, semantic-web indexer that keeps all shared data current Encryption-based sharing Target of attacks: prevention of coding errors that leak data Dynamically generated user interfaces Based on semantic information Tailored to individual users and display technology APIs to support inter-operability and extensibility Identity management Distributed software management Computation resource management in the cloud
15 Early Prototype Design Personal data view -Cached -Source independence -Semantically indexed Personal data directory - Storage independence data anywhere Friend s data directory Physical storage S3 Gdrive Gmail Personal server
16 System Components interactive navigation legacy file system data anywhere metadata manager data manager crawler Personal facebook crawler device cache mgr local file handler http handler
17 Information Tracking Goal: Data from one principal not leaked to other principals Prevent mail to be forwarded to the wrong person Browser: Information from a bank on a browser cannot be stolen PRPL: financial, health info shared only with trusted principals Technique Reduce the trusted base to operations on sensitive resources & privilege-escalation routines Combining approaches at different levels Language provides guarantees inside processes (Lam) OS handles persistent data & sandboxes unknown processes (Mazieres) Network provides trusted messages (Mazieres) Hardware tracks low-level data efficiently (Kozyrakis)
18 User Interface Semantic-web based navigation Automatic generation of UI based on meta information Interactive generation of display based on the display size, individual capabilities and preferences Multi-modal inputs Speech is more competitive on cell phones.
19 Conclusions Clean-slate research opportunity Three-tiered architecture Interesting, challenging research topics Innovations through collaboration
Stanford Clean Slate Program
Stanford Clean Slate Program http://cleanslate.stanford.edu Nick McKeown [email protected] Faculty Director Guru Parulkar [email protected] Executive Director Stanford Clean Slate Program Two questions:
Future Trends in Mobile Technology Development: What Can We Expect in the Next 5, 10, and 15 Years? Paul Kim [email protected]
Future Trends in Mobile Technology Development: What Can We Expect in the Next 5, 10, and 15 Years? Paul Kim [email protected] Evolution Phenomenon Specie Perception Strategy Organization Technology Or
Beyond VDI: Why Thin-Client Computing and Virtual Desktop Infrastructures Aren t Cutting it
Beyond VDI: Why Thin-Client Computing and Virtual Desktop Infrastructures Aren t Cutting it Dr. Monica Lam Co-founder and Chief Scientist, MokaFive Inc. Professor of Computer Science, Stanford University
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
CTERA Cloud Storage Platform Architecture
CTERA Cloud Storage Platform Architecture Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption The killer apps of cloud storage reviewed Putting cloud storage
Mobile App Testing Process INFLECTICA TECHNOLOGIES (P) LTD
Mobile App Testing Process Mobile Application Testing Strategy EMULATOR QA team can perform most of the testing in a well-equipped test environment using device emulators with various options like ability
Enterprise Private Cloud Storage
Enterprise Private Cloud Storage The term cloud storage seems to have acquired many definitions. At Cloud Leverage, we define cloud storage as an enterprise-class file server located in multiple geographically
Access All Your Files on All Your Devices
d Access All Your Files on All Your Devices The Best Performance, Features and Price for Private cloud storage for all platforms Windows, Mac, Linux, ios, Android, Blackberry & more Enterprise Private
CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot
CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot Whitepaper by CTERA Networks Highlights How unstructured data growth drives cloud storage adoption Putting cloud storage
Google Apps Premier Edition. Email Included Yes Yes Yes Email Storage 25 GB Varies by deployment
7 Keys to Comparing with Microsoft Exchange Server 2003/2007 Partner Guide Introduction is Google s Software as a Service (SaaS) solution for business messaging, collaboration, and security. It includes
Solve BYOD with! Workspace as a Service!
Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology
Web Technologies: RAMCloud and Fiz. John Ousterhout Stanford University
Web Technologies: RAMCloud and Fiz John Ousterhout Stanford University The Web is Changing Everything Discovering the potential: New applications 100-1000x scale New development style New approach to deployment
Budget Event Management Design Document
Budget Event Management Design Document Team 4 Yifan Yin(TL), Jiangnan Shangguan, Yuan Xia, Di Xu, Xuan Xu, Long Zhen 1 Purpose Summary List of Functional Requirements General Priorities Usability Accessibility
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Maginatics Cloud Storage Platform A primer
Maginatics Cloud Storage Platform A primer Who is Maginatics? Maginatics is an emerging leader in distributed enterprise storage solutions. We provide enterprises with distributed, scalable and secure
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
GCM for Android Setup Guide
GCM for Android Setup Guide This guide provides information on...... Prerequisites for using Google Cloud Messaging service... Instructions for setting up GCM service via the Google API console... Configuring
Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst
ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test
126 SW 148 th Street Suite C-100, #105 Seattle, WA 98166 Tel: 877-795-9372 Fax: 866-417-6192 www.seattlepro.com
SharePoint 2010 Bootcamp This five-day course is designed to equip Systems Administrators, Integrators and Developers with a strong foundation for implementing solutions on Microsoft SharePoint 2010. Attendees
Egnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
Project Plan Microsoft Team System Web Client
Project Plan Microsoft Team System Web Client Team 6. TechSmith CSE 498, Collaborative Design Jon Anderson Paul Dziadzio Eric Henry Dan Laboy Department of Computer Science and Engineering Michigan State
Intelligence. Productivity. Mobility. Unified Service. Predictive analytics: Offline mobile: Self, assisted & field service
Productivity Intelligence Mobility Unified Service Next generation productivity: Predictive analytics: Offline mobile: Self, assisted & field service Surface trending documents with Delve Immersive Excel
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
Espial IPTV Middleware. Evo Solution Whitepaper. <Title> Delivering Interactive, Personalized 3-Screen Services
Espial IPTV Middleware Evo Solution Whitepaper Delivering Interactive, Personalized 3-Screen Services April 2010 Espial Group 1997-2010. All rights reserved The 3-Screen Challenge Differentiate
SAS Information Delivery Portal
SAS Information Delivery Portal Table of Contents Introduction...1 The State of Enterprise Information...1 Information Supply Chain Technologies...2 Making Informed Business Decisions...3 Gathering Business
CLOUD COMPUTING. When it's smarter to rent than to buy.. Presented by Anand Tirumani
CLOUD COMPUTING When it's smarter to rent than to buy.. Presented by Anand Tirumani Agenda Cloud Computing: Concepts and Terminologies What is Cloud Computing? Essential Characteristics Service Models
Migrating SaaS Applications to Windows Azure
Migrating SaaS Applications to Windows Azure Lessons Learned 04.04.2012 Speaker Introduction Deepthi Raju Marketing Technology Services Deepthi joined Smartbridge in 2005 and has over twenty years of technology
THE LINK OFFLINE DATA ARCHITECTURE
SECURE ENTERPRISE HTML5 THE LINK OFFLINE DATA ARCHITECTURE A MOBILE HELIX WHITEPAPER THE LINK OFFLINE DATA ARCHITECTURE The Link HTML5 SDK makes it simple for developers to build mobile apps with offline
Cloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions
Choosing a File Sync & Share Solution PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Agenda File Sync & Share What and Why File Sync & Share How Selection Criteria Q & A Summary 3
Horizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: [email protected] Roadmap Introduction Challenges
Application Development Best Practices
Application Development Best Practices THE ENTERPRISE MOBILUTION ERA An InfoStretch White Paper August 2014 Elevating confidence 3200 Patrick Henry Drive, Suite 250 Santa Clara, CA 95054 408.727.1100 [email protected]
A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief
A Virtual Filer for VMware s Virtual SAN A Maginatics and VMware Joint Partner Brief With the massive growth of unstructured data in today s enterprise environments, storage IT administrators are constantly
ON.Lab Launches Revolutionary SDN Open Source Network Operating System ONOS on behalf of its Community of Service Providers and Innovator Partners
ON.Lab Launches Revolutionary SDN Open Source Network Operating System ONOS on behalf of its Community of Service Providers and Innovator Partners Available publicly on Dec. 5, ONOS has the potential to
Microsoft Windows Intune: Cloud-based solution
Microsoft Windows Intune: Cloud-based solution So what exactly is Windows Intune? Windows Intune simplifies and helps businesses manage and secure PCs using Windows cloud services and Windows 7. Windows
SharePoint 2010 Interview Questions-Architect
Basic Intro SharePoint Architecture Questions 1) What are Web Applications in SharePoint? An IIS Web site created and used by SharePoint 2010. Saying an IIS virtual server is also an acceptable answer.
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
custom hosting for how you do business
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
ONOS [Open Source SDN Network Operating System for Service Provider networks]
ONOS [Open Source SDN Network Operating System for Service Provider networks] http://onosproject.org/ Released on December 5 th, 2014 Guru Parulkar [email protected] ONOS Partnership A partnership
Extending The Value of SAP with the SAP BusinessObjects Business Intelligence Platform Product Integration Roadmap
Extending The Value of SAP with the SAP BusinessObjects Business Intelligence Platform Product Integration Roadmap Naomi Tomioka Phipps Principal Solution Advisor Business User South East Asia 22 nd April,
A Standards-based Mobile Application IdM Architecture
A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted
Application Development for Mobile and Ubiquitous Computing
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Application Development for Mobile and Ubiquitous Computing Seminar Introduction Dr. Ing. Thomas Springer Technische
Product Information. Sugar vs Zoho. Features Comparison
Product Information vs Zoho Features Comparison CRM Community Price / user / month $0 $35 $45 $60 $100 $0 $12 $25 Price / user / year $0 $420 $540 $720 $1,200 $0 $144 $300 User limits no limit no limit
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
The Porticor Virtual Private Data solution includes two or three major components:
Architecture The Porticor solution offers a rich variety of cloud encryption capabilities. Your project s needs and characteristics will determine the right choices for your application. The Porticor Virtual
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
cbox YOUR FILES GO MOBILE! FOR MAC OSX CLIENT USER MANUAL
cbox YOUR FILES GO MOBILE! FOR MAC OSX CLIENT USER MANUAL Introduction cbox is a software that you can easily install on your computer. Once done, an online storage drive cbox appears in the file tree
Smartphone Enterprise Application Integration
WHITE PAPER MARCH 2011 Smartphone Enterprise Application Integration Rhomobile - Mobilize Your Enterprise Overview For more information on optimal smartphone development please see the Rhomobile White
Choices for implementing SMB 3 on non Windows Servers Dilip Naik HvNAS Pty Ltd Australians good at NAS protocols!
Choices for implementing SMB 3 on non Windows Servers Dilip Naik HvNAS Pty Ltd Australians good at NAS protocols! Focus & contents of this talk Why SMB 3? How SMB 3? Implementing an SMB 3 Server on Linux/UNIX
Sugar Professional. Approvals + + + + Competitor tracking + + + + Territory management + + + + Third-party sales methodologies + + + +
Professional Corporate Enterprise Ultimate List price / user / month $35 $45 $60 $100 List price / user / year (contractual term) $420 $540 $720 $1,200 Application or user limits no limits no limits no
Cloud-based Infrastructures. Serving INSPIRE needs
Cloud-based Infrastructures Serving INSPIRE needs INSPIRE Conference 2014 Workshop Sessions Benoit BAURENS, AKKA Technologies (F) Claudio LUCCHESE, CNR (I) June 16th, 2014 This content by the InGeoCloudS
Office365 Packaged Consultancy
Office365 Packaged Consultancy Parative have created a set of Office365 delivery packages that will suit pretty much any size of business. Office365 is a flexible cloud based product suite that will fit
Virtual Desktop VMware View Horizon
Virtual Desktop VMware View Horizon Presenter - Scott Le Marquand VMware Virtualization consultant with 6 years consultancy experience VMware Certified Professional 5 Data Center Virtualization VMware
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
Image Area. White Paper. Best Practices in Mobile Application Testing. - Mohan Kumar, Manish Chauhan. www.infosys.com
Image Area White Paper Best Practices in Mobile Application Testing - Mohan Kumar, Manish Chauhan www.infosys.com Contents Introduction 3 QA Challenges in Mobile Application Testing 3 Device Variation
Enabling Device-Independent Mobility with Dynamic Virtual Clients
IT@Intel White Paper Intel Information Technology Mobility November 2009 Enabling Device-Independent Mobility with Dynamic Virtual Clients Executive Overview DIM would enable us to deliver the information
MatchPoint Benefits with SharePoint 2013
MatchPoint Benefits with SharePoint 2013 MatchPoint Fact Sheet 25.01.2013 Colygon AG Version 2.0 Disclaimer The complete content of this document is subject to the general terms and conditions of Colygon
Deploying a distributed data storage system on the UK National Grid Service using federated SRB
Deploying a distributed data storage system on the UK National Grid Service using federated SRB Manandhar A.S., Kleese K., Berrisford P., Brown G.D. CCLRC e-science Center Abstract As Grid enabled applications
Big Data Visualization with JReport
Big Data Visualization with JReport Dean Yao Director of Marketing Greg Harris Systems Engineer Next Generation BI Visualization JReport is an advanced BI visualization platform: Faster, scalable reports,
White Paper. Software Development Best Practices: Enterprise Code Portal
White Paper Software Development Best Practices: Enterprise Code Portal An Enterprise Code Portal is an inside the firewall software solution that enables enterprise software development organizations
Resonate Central Dispatch
Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and
App Operating Instructions Manual ES File Explorer
App Operating Instructions Manual ES File Explorer 2013/5 ES File Explorer (for Android only) In addition to managing local / shared / FTP / and Bluetooth file folders, you can also directly manage a variety
Storage Design for High Capacity and Long Term Storage. DLF Spring Forum, Raleigh, NC May 6, 2009. Balancing Cost, Complexity, and Fault Tolerance
Storage Design for High Capacity and Long Term Storage Balancing Cost, Complexity, and Fault Tolerance DLF Spring Forum, Raleigh, NC May 6, 2009 Lecturer: Jacob Farmer, CTO Cambridge Computer Copyright
Simplifying IT with SDN & Virtual Application Networks
Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
SAP Database Strategy Overview. Uwe Grigoleit September 2013
SAP base Strategy Overview Uwe Grigoleit September 2013 SAP s In-Memory and management Strategy Big- in Business-Context: Are you harnessing the opportunity? Mobile Transactions Things Things Instant Messages
IBM MobileFirst Protect: Secure & Manage your mobile enterprise
IBM MobileFirst Protect: Secure & Manage your mobile enterprise SolutionsConnect Vietnam March 2015 Stephen Downie Growth Markets, Unified Endpoint Management 1 Digital and mobile technologies are making
Zentera Cloud Federation Network for Hybrid Computing
Zentera Cloud Federation Network for Hybrid Computing The New Era of Hybrid Computing Cloud computing technology, the next computing paradigm after client-server, will shift enterprise IT to a new era
Building Storage Service in a Private Cloud
Building Storage Service in a Private Cloud Sateesh Potturu & Deepak Vasudevan Wipro Technologies Abstract Storage in a private cloud is the storage that sits within a particular enterprise security domain
Implementing Mobile Thin client Architecture For Enterprise Application
Research Paper Implementing Mobile Thin client Architecture For Enterprise Paper ID IJIFR/ V2/ E1/ 037 Page No 131-136 Subject Area Information Technology Key Words JQuery Mobile, JQuery Ajax, REST, JSON
Transform EMC Object Storage Into Enterprise Storage Services
Transform EMC Object Storage Into Enterprise Storage Services CTERA Networks Our Focus Backup Private Sync & Share Gateways Hybrid Public Enabling Organizations To Securely and Simply Share, Serve and
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Microsoft SharePoint Architectural Models
Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Point of View Mobii 925 - Android 4.2 Tablet PC. General notices for use... 2 Disclaimer... 2 Box Contents... 2
Table of Contents General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Buttons and connections... 3 1.2 Start up and shut down... 3 2.0 Introduction to Google Android
ni.com Remote Connectivity with LabVIEW
Remote Connectivity with LabVIEW What Is Remote Connectivity? Local Monitoring 3 Remote Mobile Access 4 What Is Remote Connectivity Two machines talking to one another Client Server PC PC Consumes Data
Accelerate SDN Adoption with Open Source SDN Control Plane
Accelerate SDN Adoption with Open Source SDN Control Plane with a difference Guru Parulkar [email protected] 1 Thinking influenced by Nick McKeown, Sco6 Shenker, and Colleagues at ON.Lab, Stanford
Storage Multi-Tenancy for Cloud Computing. Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member
Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member March, 2010 Table of Contents Introduction...1 What is Multi-Tenancy?...2 Storage Multi-Tenancy...2 Enabling Cloud-Based Data Management CDMI...3
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE
AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE Copyright This document is provided "as-is." Information and views expressed in this document, including
