Cloud&backed,Internet,of,Things, Security,and,Dependability,
|
|
|
- Arron Francis
- 10 years ago
- Views:
Transcription
1 Cloudbacked,Internet,of,Things, Security,and,Dependability, Miguel,Pupo,Correia, 2015EuropeanSecurityConference,ISEG,June2015, Schedule 1. InternetofThingsmeetstheCloud 2. SecuredPersonalDevice 3. ShuGle:cloudintrusionrecovery 2, 1
2 1.,INTERNET,OF,THINGS,MEETS,THE, CLOUD, 3, InternetofThings embeddedcomputajonaldeviceseverywhere PCAS 4, 2
3 InternetofThings InternetofThings(IoT)vision=billionsof things connectedtotheinternet(gartner:26bin2020) Things embeddedcomputajonaldevices,cybert physical(sensors,actuators) TypicallyconnectedusingwirelesscommunicaJons WiFi,GSM/3G/4G/5G,Bluetooth,NFC 5, CompuJngasauJlity usecomputajonal resourceswithout buyingthem CAPEXvsOPEX PayTasTyouTgo ElasJcity CloudCompuJng 6, 3
4 IoTmeetstheCloud ManyIoTapplicaJonsneedapla\orm Cloudisaconvenientenvironmentforthatpla\orm Payasyougosupportsgrowthandbigdata(26B...) 7, IoTPla\ormsintheCloud FuncJonality ManagementandinterconnecJonofthethings Datastorage,processing,andanalysis BusinessprocessimplementaJonandmonitoring InteracJonamongusers 8, 4
5 IoTPla\ormsintheCloud OpenSensors.io Collectssensordata(MQTT) Dataisofferedtoallusers(unlessclientpays) ProvidesdataflowstoapplicaJons Datastorage,devicemanagement,... Carriots Collectsthings data(rest/http) Managesdevicesanddata SupportsapplicaJonimplementaJonandexecuJon andothers 9, 2.,SECURED,PERSONAL,DEVICE, 10, 5
6 MoJvaJon:smartphoneintrusions Smartphoneisahandyplacetoputpersonaldata... buttheirsecuritystatusisquitebadandstorageislimited Mobile Threat Classifications, 2013 Source: Symantec Track User Risks that spy on the individual using the device, collecting SMS messages or phone call logs, tracking GPS coordinates, recording phone calls, or gathering pictures and video taken with the device. 35% % 20% 32% 28% 30% Steal Information This includes the collection of both device- and user-specific data, such as device information, configuration data, or banking details. Traditional Threats Threats that carry out traditional malware functions, such as back doors and downloaders % 10% 8% 9% 8% 8% 15% Reconfigure Device These types of risks attempt to elevate privileges or simply modify various settings within the operating system. 5 Send Content Adware Reconfigure Traditional Steal Annoyance Device Threats Information Track User Adware/Annoyance Mobile risks that display advertising or generally perform actions to disrupt the user. Send Content These risks will send text messages to premium SMS numbers, ultimately appearing on the bill of the device s owner. Other risks can be used to send spam messages. Source:SymantecITSR , ProjectPCASoverview PCASaimsatimplemenJngasecurehandheld device:thesecuredpersonaldevice(spd) asmartphoneaddton(or sleeve ) recognizestheuserusingseveralbiometricsensors allowsuserstoauthenjcatethemselves allowsuserstosecurelystoredata cancommunicatewithtrusted(cloud)services 12, 6
7 SPDsketches 13, Scenarios TwousecasesarebeingusedforvalidaJon: Electronichealth SPDisusedforstoringpersonalhealth dataaswellasaccesspointtotheehratthecloud Universitycampus SPDisusedforbeGeraccesscontrol andmoresecureauthenjcajonintocampusservices (canteen,library,website,...) 14, 7
8 Usage 15, SPDmeetstheCloud Bio,Sensors SPD Smart Phone Cloud CPU, Gate, Unit AuthenWcaWon, Unit,, Protected,,, Encrypted,Storage, USB, Secure,Channel SemiTrusted,, Apps Secure,comm., Service,, Trusted,, App, 16, 8
9 3.,SHUTTLE:,CLOUD,INTRUSION, RECOVERY, 17, MoJvaJon:cloudintrusions Intrusion/faultcauses: Solwareflaws ConfiguraJonandusagemistakes CorruptedlegiJmaterequests Intrusions/faultsmaycompromisedata/service: Integrity Availability ConfidenJality 18, 9
10 Goal RecoverapplicaJons dataintegrity whenintrusionshappen 19, Backups? User,AcWon, Malicious, AcWon, Backup, WorksbutremovesbothbadandgoodacJons ShuGle:removesbadacJonsbutkeepsgoodacJons t 20, 10
11 Pla\ormasaService(PaaS) Cloudservice=torunapplicaJons ConsumerdevelopsapplicaJontoruninthat environment,using Supportedlanguages,e.g.,Java,Python,Go,PHP Supportedcomponents,e.g.,SQL/noSQLdatabases,load balancers 21, ShuGleintrusionrecoveryservice Features: Supportedbythecloud:availablewithoutsetup RemovestheintrusioneffectsintheapplicaJons state SupportsapplicaJonsdeployedinvariousinstances AvoidsapplicaJondownJme CosteffecJve Recoversfast 22, 11
12 ShuGlearchitecture User requests Proxy Manager Shuttle Storage Legend: Load Balancer Interceptor Application Server DB Proxy Database Instance normalexecujon:log, Replay takesnapshots Instance Interceptor Application Server DB Proxy Database Instance Scalling User Requests Replay Requests Control Messages 23, ReplayProcess 1. IdenJfythemaliciousacJons(notpartofShuGle) 2. StartnewapplicaJonanddatabaseinstances 3. Loadasnapshotprevioustointrusioninstant Createanewbranch;keepstheapplicaJonrunninginpreviousbranch 4. Replayrequestsinnewbranch 5. Blockincomingrequests;replaylastrequests 6. Changetonewbranch;shutdownunnecessary instances 24, 12
13 ReplayModes FullReplay:ReplayeveryoperaJonalersnapshot SelecWveReplay:Replayonlyaffected(tainted)operaJons Serial:,ReplayalldependencygraphsequenJally Clustered:,Independentclusterscanbereplayedconcurrently, FullTReplay SelecJveTReplay 1Cluster(Serial) Clustered 25, EvaluaJonEnvironment AmazonEC2,c3.xlargeinstances,GbEthernet WildFly(formelyJBoss)applicaJonservers Voldemortdatabase AskQAapplicaJon;datafromStackExchange 26, 13
14 PerformanceoverheadevaluaJon innormalexecujon Workload A Workload B Shuttle 6325 ops/sec [5.78 ms] ops/sec [3.62 ms] No Shuttle 7148 ops/sec [5.07 ms] ops/sec [3.01 ms] overhead 13% [14%] 16% [20%] Table II OVERHEAD IN THROUGHPUT (OPS/SEC) AND RESPONSE LATENCY (MS). full replay. The attack effects are removed because Shuttle loads a database snapshot instead of undoing every operation. As the malicious actions were not logged, they are not replayed and Shuttle recovers the application consistency. 27, The number of requests to replay is defined by the snapshot instant: on full replay Shuttle replays all requests performed after the intrusion instant, while on selective replay Shuttle replays the requests necessary to read the values of the entries before the intrusion and the tainted requests. While selective replay seems torecoveryjme have a big advantage comparing with full replay, which performs, in these scenarios, at least requests, some applications have more dependencies thus the for1millionrequests number of tainted requests is bigger. For instance, if the order between questions with the same tag is considered as a dependency, the number of dependencies rises from to and the number of independent clusters decreases from 6992 to 56. C. Performance We evaluate Shuttle s performance considering the throughput of the application, the size of the logs and the recovery time. We also estimate the cost of deployment of Shuttle on a public cloud provider, Amazon Web Services (AWS). We run 6 AWS c3.xlarge instances (14 ECUs, 4 vcpus, 2.8 GHz, Intel 28, Xeon E5-2680v2, 7.5 GB of memory, 2 x 40 GB storage capacity) connected by gigabit ethernet (780Mbps measured with iperf, 0.176ms round-trip time measured with ping). We use one client, one instance with Shuttle proxy and a load balancer (HAProxy), three WildFly (formerly JBoss) application servers and one Voldemort database. We consider a large data sample from the data of Stack Exchange with requests (1432 questions, 3399 answers, 8335 comments, votes, 950 Update latency (us) show Shuttle has accesses N Throughput (thousa (a) Workload A Figure Recovery. We m replay the sample cluster) takes appr clusters takes only We measured th instances on cluste Shuttle is scalable reducing the time half the time of 1 Requests per second clu 0 00:00 05:00 10:00 15 Time (minu (a) Recove Figu We measured 14 th two clients with The serial replay application server (2953s total, 1100
15 CONCLUSION, 29, Conclusion CloudandIoT,agreatmatch Thingscommunicatewithscalablepla\orminthecloud Payasyougo,elasJcity Intrusionsmayhappeninmobiledevices SPD,anoveldeviceforauthenJcaJonanddataprotecJon Dataphysicallyisolated,protectedwithbiometrics Intrusionsmayhappeninthecloud ShuGle,arecoveryserviceforPaaSofferings LeveragestheresourceelasJcityandpayTperTusemodelto reducetherecoveryjmeandcosts 30, 15
16 THANK,YOU,
1000Mbps Ethernet Performance Test Report 2014.4
1000Mbps Ethernet Performance Test Report 2014.4 Test Setup: Test Equipment Used: Lenovo ThinkPad T420 Laptop Intel Core i5-2540m CPU - 2.60 GHz 4GB DDR3 Memory Intel 82579LM Gigabit Ethernet Adapter CentOS
Cloud Computing and Amazon Web Services
Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD
Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
Yahoo! Cloud Serving Benchmark
Yahoo! Cloud Serving Benchmark Overview and results March 31, 2010 Brian F. Cooper [email protected] Joint work with Adam Silberstein, Erwin Tam, Raghu Ramakrishnan and Russell Sears System setup and
How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)
Scalability Results Select the right hardware configuration for your organization to optimize performance Table of Contents Introduction... 1 Scalability... 2 Definition... 2 CPU and Memory Usage... 2
Shared Parallel File System
Shared Parallel File System Fangbin Liu [email protected] System and Network Engineering University of Amsterdam Shared Parallel File System Introduction of the project The PVFS2 parallel file system
AVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
Scalable Architecture on Amazon AWS Cloud
Scalable Architecture on Amazon AWS Cloud Kalpak Shah Founder & CEO, Clogeny Technologies [email protected] 1 * http://www.rightscale.com/products/cloud-computing-uses/scalable-website.php 2 Architect
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
How swift is your Swift? Ning Zhang, OpenStack Engineer at Zmanda Chander Kant, CEO at Zmanda
How swift is your Swift? Ning Zhang, OpenStack Engineer at Zmanda Chander Kant, CEO at Zmanda 1 Outline Build a cost-efficient Swift cluster with expected performance Background & Problem Solution Experiments
SecureSphere Appliances
DATASHEET SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding datacenter environments. With fail open interfaces,
Fixed Price Website Load Testing
Fixed Price Website Load Testing Can your website handle the load? Don t be the last one to know. For as low as $4,500, and in many cases within one week, we can remotely load test your website and report
Network Performance Between Geo-Isolated Data Centers. Testing Trans-Atlantic and Intra-European Network Performance between Cloud Service Providers
Network Performance Between Geo-Isolated Data Centers Testing Trans-Atlantic and Intra-European Network Performance between Cloud Service Providers Published on 4/1/2015 Network Performance Between Geo-Isolated
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software
Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance
Kaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
Shadi Khalifa Database Systems Laboratory (DSL) [email protected]
Shadi Khalifa Database Systems Laboratory (DSL) [email protected] What is Amazon!! American international multibillion dollar electronic commerce company with headquarters in Seattle, Washington, USA.
Building Success on Acquia Cloud:
Building Success on Acquia Cloud: 10 Layers of PaaS TECHNICAL Guide Table of Contents Executive Summary.... 3 Introducing the 10 Layers of PaaS... 4 The Foundation: Five Layers of PaaS Infrastructure...
WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
2 WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.3 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
Dimension Data Enabling the Journey to the Cloud
Dimension Data Enabling the Journey to the Cloud Grant Morgan General Manager: Cloud 14 August 2013 Client adoption: What our clients were telling us The move to cloud services is a journey over time and
Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity
P3 InfoTech Solutions Pvt. Ltd http://www.p3infotech.in July 2013 Created by P3 InfoTech Solutions Pvt. Ltd., http://p3infotech.in 1 Web Application Deployment in the Cloud Using Amazon Web Services From
How To Cloud Compute At The Cloud At The Cyclone Center For Cnc
Cloud Computing at CDC Current Status and Future Plans Earl Baum March, 2014 1 Background Current Activities Agenda Use Cases, Shared Services and Other Considerations What s Next 2 Background Cloud Definition
Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control
Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control Installation Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in
Cisco M-Series Content Security Management Appliance for Email and Web Security Appliances
Data Sheet Cisco M-Series Content Security Management Appliance for Email and Web Security Appliances Product Overview Cisco M-Series Content Security Management Appliances centralize and consolidate policy
IBM Platform Computing Cloud Service Ready to use Platform LSF & Symphony clusters in the SoftLayer cloud
IBM Platform Computing Cloud Service Ready to use Platform LSF & Symphony clusters in the SoftLayer cloud February 25, 2014 1 Agenda v Mapping clients needs to cloud technologies v Addressing your pain
VMware vcenter Server 6.0 Cluster Performance
VMware vcenter Server 6.0 Cluster Performance Performance Study TECHNICAL WHITE PAPER Table of Contents Introduction... 3 Experimental Setup... 3 Layout... 3 Software Configuration... 5 Performance Benchmark...
Networking Virtualization Using FPGAs
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
AKCess Pro Server Management Software
Management Software v.100.00x takes the best from IP Video Monitoring Software and is the first to combine it with Environmental / Security Sensor and Access Control equipment in one centralized management
DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index
DIR Contract Number DIR-TSO-2621 Appendix C Index CenturyLink Technology s offers Tier 3 Cloud services: Public Cloud, Private Cloud and Hybrid Cloud provided over our Tier One network. We own and operate
Patriot Hardware and Systems Software Requirements
Patriot Hardware and Systems Software Requirements Patriot is designed and written for Microsoft Windows. As a result, it is a stable and consistent Windows application. Patriot is suitable for deployment
Accelerating Web-Based SQL Server Applications with SafePeak Plug and Play Dynamic Database Caching
Accelerating Web-Based SQL Server Applications with SafePeak Plug and Play Dynamic Database Caching A SafePeak Whitepaper February 2014 www.safepeak.com Copyright. SafePeak Technologies 2014 Contents Objective...
Building a Private Cloud with Eucalyptus
Building a Private Cloud with Eucalyptus 5th IEEE International Conference on e-science Oxford December 9th 2009 Christian Baun, Marcel Kunze KIT The cooperation of Forschungszentrum Karlsruhe GmbH und
CribMaster Database and Client Requirements
FREQUENTLY ASKED QUESTIONS CribMaster Database and Client Requirements GENERAL 1. WHAT TYPE OF APPLICATION IS CRIBMASTER? ARE THERE ANY SPECIAL APPLICATION SERVER OR USER INTERFACE REQUIREMENTS? CribMaster
CLOUDFORMS Open Hybrid Cloud
Open Hybrid Cloud Cloud Evolution statt Cloud Revolution Lutz Lange, RHCA, Solution Architect, Red Hat Frank Rosendahl, RHCA, Solution Architect, DASEQ GmbH Cloud Operations Management Delivers an Open
EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications
ECE6102 Dependable Distribute Systems, Fall2010 EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications Deepal Jayasinghe, Hyojun Kim, Mohammad M. Hossain, Ali Payani
IncidentMonitor Server Specification Datasheet
IncidentMonitor Server Specification Datasheet Prepared by Monitor 24-7 Inc October 1, 2015 Contact details: [email protected] North America: +1 416 410.2716 / +1 866 364.2757 Europe: +31 088 008.4600
Amazon EC2 Product Details Page 1 of 5
Amazon EC2 Product Details Page 1 of 5 Amazon EC2 Functionality Amazon EC2 presents a true virtual computing environment, allowing you to use web service interfaces to launch instances with a variety of
Microsoft Exchange Server 2003 Deployment Considerations
Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers
Best Practices for Using MySQL in the Cloud
Best Practices for Using MySQL in the Cloud Luis Soares, Sr. Software Engineer, MySQL Replication, Oracle Lars Thalmann, Director Replication, Backup, Utilities and Connectors THE FOLLOWING IS INTENDED
InterScan Web Security Virtual Appliance
InterScan Web Security Virtual Appliance Sizing Guide for version 6.0 July 2013 TREND MICRO INC. 10101 N. De Anza Blvd. Cupertino, CA 95014 www.trendmicro.com Toll free: +1 800.228.5651 Fax: +1 408.257.2003
Scaling in a Hypervisor Environment
Scaling in a Hypervisor Environment Richard McDougall Chief Performance Architect VMware VMware ESX Hypervisor Architecture Guest Monitor Guest TCP/IP Monitor (BT, HW, PV) File System CPU is controlled
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Amazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
Backup for branch offices and compartment backups. Måns Höiom & Rikard Lindkvist
Backup for branch offices and compartment backups Måns Höiom & Rikard Lindkvist Today s IT Challenges: Why Better Backup is needed? Accelerated Data Growth 62% Year Over Year This kind of data growth means
Cisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Microsoft Private Cloud Fast Track
Microsoft Private Cloud Fast Track Microsoft Private Cloud Fast Track is a reference architecture designed to help build private clouds by combining Microsoft software with Nutanix technology to decrease
Virtualization and IaaS management
CLOUDFORMS Virtualization and IaaS management Calvin Smith, Senior Solutions Architect [email protected] VIRTUALIZATION TO CLOUD CONTINUUM Virtual Infrastructure Management Drivers Server Virtualization
DACSA: A Decoupled Architecture for Cloud Security Analysis
DACSA: A Decoupled Architecture for Cloud Security Analysis Jason Gionta, William Enck, Peng Ning NC State Ahmed Azab Samsung Ltd Xialoan Zhang Google Inc Cloud Provider Landscape Cloud Provider Landscape
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
ACANO SOLUTION VIRTUALIZED DEPLOYMENTS. White Paper. Simon Evans, Acano Chief Scientist
ACANO SOLUTION VIRTUALIZED DEPLOYMENTS White Paper Simon Evans, Acano Chief Scientist Updated April 2015 CONTENTS Introduction... 3 Host Requirements... 5 Sizing a VM... 6 Call Bridge VM... 7 Acano Edge
Overview: X5 Generation Database Machines
Overview: X5 Generation Database Machines Spend Less by Doing More Spend Less by Paying Less Rob Kolb Exadata X5-2 Exadata X4-8 SuperCluster T5-8 SuperCluster M6-32 Big Memory Machine Oracle Exadata Database
Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study
Creating Value Delivering Solutions Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study Chris Zajac, NJDOT Bud Luo, Ph.D., Michael Baker Jr., Inc. Overview
AgencyPortal v5.1 Performance Test Summary Table of Contents
AgencyPortal v5.1 Performance Test Summary Table of Contents 1. Testing Approach 2 2. Server Profiles 3 3. Software Profiles 3 4. Server Benchmark Summary 4 4.1 Account Template 4 4.1.1 Response Time 4
Powerful Online Solutions HOSTING. Price List. Surge Media Pty Ltd MAINTENANCE & SUPPORT Price List 1
Powerful Online Solutions HOSTING Price List Surge Media Pty Ltd MAINTENANCE & SUPPORT Price List 1 Document Control Release history Author Date Version Surge Media 01/02/2016 2.2 Confidentiality The information
On- Prem MongoDB- as- a- Service Powered by the CumuLogic DBaaS Platform
On- Prem MongoDB- as- a- Service Powered by the CumuLogic DBaaS Platform Page 1 of 16 Table of Contents Table of Contents... 2 Introduction... 3 NoSQL Databases... 3 CumuLogic NoSQL Database Service...
Feature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V
Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...
Eloquence Training What s new in Eloquence B.08.00
Eloquence Training What s new in Eloquence B.08.00 2010 Marxmeier Software AG Rev:100727 Overview Released December 2008 Supported until November 2013 Supports 32-bit and 64-bit platforms HP-UX Itanium
Total Data Protection for your business
A platform to empower your business C Y K C K C K Total Data Protection for your business Protecting business data No matter where it lives At Breakwater we understand the importance of a dependable, extremely
Cloud Computing through Virtualization and HPC technologies
Cloud Computing through Virtualization and HPC technologies William Lu, Ph.D. 1 Agenda Cloud Computing & HPC A Case of HPC Implementation Application Performance in VM Summary 2 Cloud Computing & HPC HPC
Liferay Portal s Document Library: Architectural Overview, Performance and Scalability
Liferay Portal s Document Library: Architectural Overview, Performance and Scalability Table of Contents EXECUTIVE SUMMARY... 1 HIGH LEVEL ARCHITECTURE... 2 User Interface Layer... 2 Service Layer....
Splunk Enterprise in the Cloud Vision and Roadmap
Copyright 2013 Splunk Inc. Splunk Enterprise in the Cloud Vision and Roadmap Alex Munk PM Cloud #splunkconf Ledio Ago Director of Engineering Cloud Legal NoJces During the course of this presentajon, we
Cloud Server Performance A Comparative Analysis of 5 Large Cloud IaaS Providers
Cloud Server Performance A Comparative Analysis of 5 Large Cloud IaaS Providers Cloud Spectator Study June 5, 2013 With a lack of standardization in the IaaS industry, providers freely use unique terminology
Imperva SecureSphere Appliances
Imperva SecureSphere Appliances DA T A SH E E T Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior and resiliency for demanding data center environments. With fail open interfaces,
THE DEFINITIVE GUIDE FOR AWS CLOUD EC2 FAMILIES
THE DEFINITIVE GUIDE FOR AWS CLOUD EC2 FAMILIES Introduction Amazon Web Services (AWS), which was officially launched in 2006, offers you varying cloud services that are not only cost effective, but also
PSAM, NEC PCIe SSD Appliance for Microsoft SQL Server (Reference Architecture) September 11 th, 2014 NEC Corporation
PSAM, NEC PCIe SSD Appliance for Microsoft SQL Server (Reference Architecture) September 11 th, 2014 NEC Corporation 1. Overview of NEC PCIe SSD Appliance for Microsoft SQL Server Page 2 NEC Corporation
INTERNET SECURITY THREAT REPORT
APRIL 2015 VOLUME 20 INTERNET SECURITY THREAT REPORT APPENDICES 2 2015 Internet Security Threat Report Appendices THREAT ACTIVITY TRENDS MALICIOUS CODE TRENDS SPAM & FRAUD ACTIVITY TRENDS VULNERABILITY
SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE
VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
ORACLE DATABASE HIGH AVAILABILITY STRATEGY, ARCHITECTURE AND SOLUTIONS
ORACLE DATABASE HIGH AVAILABILITY STRATEGY, ARCHITECTURE AND SOLUTIONS DOAG Nuremberg - 17/09/2013 Kirill Loifman Oracle Certified Professional DBA www: dadbm.com Twitter: @loifmkir ELEMENTS OF HIGH AVAILABILITY
RAID Performance Analysis
RAID Performance Analysis We have six 500 GB disks with 8 ms average seek time. They rotate at 7200 RPM and have a transfer rate of 20 MB/sec. The minimum unit of transfer to each disk is a 512 byte sector.
Molecular Devices High Content Data Management Solution Database Schema
Molecular Devices High Content Data Management Solution Database Schema For: MetaXpress Software, MetaXpress PowerCore Software, MDCStore Data Management Solution, and AcuityXpress Software Computer and
White Paper. Recording Server Virtualization
White Paper Recording Server Virtualization Prepared by: Mike Sherwood, Senior Solutions Engineer Milestone Systems 23 March 2011 Table of Contents Introduction... 3 Target audience and white paper purpose...
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
PostgreSQL Performance Characteristics on Joyent and Amazon EC2
OVERVIEW In today's big data world, high performance databases are not only required but are a major part of any critical business function. With the advent of mobile devices, users are consuming data
securityserver Unparalleled management and detection of security, environmental, and disaster control resources.
securityserver Unparalleled management and detection of security, environmental, and disaster control resources. Map cameras & sensors in server rooms or buildings in cities AKCP securityserver puts you
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Evaluation Report: Emulex OCe14102 10GbE and OCe14401 40GbE Adapter Comparison with Intel X710 10GbE and XL710 40GbE Adapters
Evaluation Report: Emulex OCe14102 10GbE and OCe14401 40GbE Adapter Comparison with Intel X710 10GbE and XL710 40GbE Adapters Evaluation report prepared under contract with Emulex Executive Summary As
SUN ORACLE DATABASE MACHINE
SUN ORACLE DATABASE MACHINE FEATURES AND FACTS FEATURES From 2 to 8 database servers From 3 to 14 Sun Oracle Exadata Storage Servers Up to 5.3 TB of Exadata QDR (40 Gb/second) InfiniBand Switches Uncompressed
Converged storage architecture for Oracle RAC based on NVMe SSDs and standard x86 servers
Converged storage architecture for Oracle RAC based on NVMe SSDs and standard x86 servers White Paper rev. 2015-11-27 2015 FlashGrid Inc. 1 www.flashgrid.io Abstract Oracle Real Application Clusters (RAC)
IEEE CQR 2010 A Holistic Approach to Mobile Security
A Holistic Approach to Mobile Security Khoi Nguyen, Group Product Manager Mobile Security and Management Group Symantec Amber Kick-off Meeting Introduction Khoi Nguyen, Group Product Manager, Mobile Security
Comparing Cloud Computing Resources for Model Calibration with PEST
Comparing Cloud Computing Resources for Model Calibration with PEST CWEMF Annual Meeting March 10, 2015 Charles Brush Modeling Support Branch, Bay-Delta Office California Department of Water Resources,
Oracle Database Deployments with EMC CLARiiON AX4 Storage Systems
Oracle Database Deployments with EMC CLARiiON AX4 Storage Systems Applied Technology Abstract This white paper investigates configuration and replication choices for Oracle Database deployment with EMC
VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop
VDI Without Compromise with SimpliVity OmniStack and Citrix XenDesktop Page 1 of 11 Introduction Virtual Desktop Infrastructure (VDI) provides customers with a more consistent end-user experience and excellent
Dell Virtual Remote Desktop Reference Architecture. Technical White Paper Version 1.0
Dell Virtual Remote Desktop Reference Architecture Technical White Paper Version 1.0 July 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES.
A Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: [email protected]
The Ultimate Business & Enterprise Hosting Solutions. www.radonhosting.com
The Ultimate Business & Enterprise Hosting Solutions Radon is for businesses that demand high performance, versatile and scalable solutions. From hosting your Website, Email, Voice, SMS and Business Applications,
Corporate PC Backup - Best Practices
A Druva Whitepaper Corporate PC Backup - Best Practices This whitepaper explains best practices for successfully implementing laptop backup for corporate workforce. White Paper WP /100 /009 Oct 10 Table
Tips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
NCTA Cloud Architecture
NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,
THE SUMMARY. ARKSERIES - pg. 3. ULTRASERIES - pg. 5. EXTREMESERIES - pg. 9
PRODUCT CATALOG THE SUMMARY ARKSERIES - pg. 3 ULTRASERIES - pg. 5 EXTREMESERIES - pg. 9 ARK SERIES THE HIGH DENSITY STORAGE FOR ARCHIVE AND BACKUP Unlimited scalability Painless Disaster Recovery The ARK
STORAGE CENTER WITH NAS STORAGE CENTER DATASHEET
STORAGE CENTER WITH STORAGE CENTER DATASHEET THE BENEFITS OF UNIFIED AND STORAGE Combining block and file-level data into a centralized storage platform simplifies management and reduces overall storage
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
