From Online Social Network Analysis to a User-Centric Private Sharing System

Total Page:16

File Type:pdf, Size:1020Kb

From Online Social Network Analysis to a User-Centric Private Sharing System From online social network analysis to a user-centric private sharing system by © Arastoo Bozorgi A thesis submitted to the School of Graduate Studies in partial fulfilment of the requirements for the degree of Doctor of Philosophy Department of Computer Science Memorial University of Newfoundland July 2020 St. John’s Newfoundland Abstract Online social networks (OSNs) have become a massive repository of data con- structed from individuals’ inputs: posts, photos, feedbacks, locations, etc. By analyzing such data, meaningful knowledge is generated that can affect individuals’ beliefs, desires, happiness and choices — a data circulation started from individuals and ended in individuals! The OSN owners, as the one authority having full control over the stored data, make the data available for research, advertisement and other purposes. However, the individuals are missed in this circle while they generate the data and shape the OSN structure. In this thesis, we started by introducing approximation algorithms for finding the most influential individuals in a social graph and modeling the spread of information. To do so, we considered the communities of individuals that are shaped in a social graph. The social graph is extracted from the data stored and controlled centrally, which can cause privacy breaches and lead to individuals’ concerns. Therefore, we introduced UPSS: the user-centric private sharing system, in which the individuals are considered as the real data owners and provides secure and private data sharing on untrusted servers. The UPSS’s public API allows the application developers to implement appli- cations as diverse as OSNs, document redaction systems with integrity properties, censorship-resistant systems, health care auditing systems, distributed version con- trol systems with flexible access controls and a filesystem in userspace. Accessing users’ data is possible only with explicit user consent. We implemented the two later cases to show the applicability of UPSS. Supporting different storage models by UPSS enables us to have a local, remote and global filesystem in userspace with one unique core filesystem implementation and having it mounted with different block stores. By designing and implementing UPSS, we show that security and privacy can be addressed at the same time in the systems that need selective, secure and ii collaborative information sharing without requiring complete trust. iii Acknowledgements I have spent almost five years of my life sitting in my office and working on my thesis until I got to this point writing this page, that is the last words of my thesis. With the support of my supervisors, family and friends, all the days of this long journey were sweet and memorable for me. I would like to thank my supervisors, Dr. Jonathan Anderson, who helped me to find my way when I was almost lost, Dr. Saeed Samet, who taught me patience and supportiveness, and Dr. Antonina Kolokolova for her wise suggestions. You taught me how to overcome the challenges in both my personal and academic life. Thanks to my mother, who never gives up with her kind support from thousands of miles away and keeping hope alive in me. Thanks to my father, who was always encouraging me to continue my studies when he was in this world. He devoted himself to his family and kept the smile on her lips even in his hard days. I also thank my brother and sisters for being a mentor for their younger brother for his entire life. I thank Dr. Todd Wareham that his office door is always open to everyone and he welcomes everyone with his bowl of candy. I never forget his help in proving the NP − hardness of one of my problems while he was busy writing a book. And finally, I would like to thank my friends for being with me whenever I need them. iv Contents Abstract ii Acknowledgements iv List of Tables x List of Figures xi 1 Introduction and Overview 1 1.1 Definitions . .2 1.2 From social influence to influence maximization . .3 1.3 Private online social network . .6 1.4 Private filesystem . .7 1.5 Contributions . .9 2 INCIM: A community-based algorithm for influence maximization prob- 2.1lem under Related the Work linear . threshold . model . 22 19 2.2 Preliminaries . 24 2.3 INCIM algorithm . 25 2.3.1 Algorithm overview . 26 2.3.2 Algorithm description . 27 2.3.2.1 Preprocessing step . 28 2.3.2.2 Computing spread of nodes . 28 v 2.3.2.3 Seed nodes selection . 34 2.4 Evaluation . 38 2.4.1 Datasets . 38 2.4.2 Algorithms to compare . 38 2.4.3 Experimental results . 40 2.5 Conclusion and future work . 45 3 Community-based influence maximization in social networks under a 3.1competitive Background linear and threshold Related model Work . 53 51 3.2 Propagation model and algorithm . 55 3.2.1 DCM propagation model . 55 3.2.2 NP-hardness of competitive influence improvement under DCM................................. 58 3.2.3 Community-based algorithm . 62 3.3 Evaluations . 65 3.3.1 Experiments setup . 66 3.3.2 Experimental Results . 69 3.4 Conclusion . 75 44.1 Privacy-preserving Preliminaries . Online . .Social . Networks: . Challenges. .and . Solutions . 85 82 4.1.1 Online Social Networks (OSNs) . 85 4.1.2 Peer-to-Peer (P2P) overlays . 86 4.1.3 Group Key Management . 87 4.2 Privacy Solutions . 88 4.2.1 Centralized OSNs . 89 4.2.2 Decentralized OSNs (Peer-to-Peer) . 95 4.2.3 Hybrid OSNs . 102 4.2.4 Healthcare online social networks . 104 4.3 Discussion . 106 vi 4.4 Recommended Privacy Solution . 108 4.4.1 Encryption mechanism . 110 4.4.2 Topology . 113 4.4.3 Data availability . 115 4.4.4 Searching . 120 4.5 Requirements of a privacy-enabled approach for healthcare online social networks . 121 4.5.1 Privacy Policies . 122 4.5.2 Friend and group recommendation . 125 4.6 Conclusion . 126 55.1 Challenges Motivation: in designing use cases a distributed . cryptographic. file . system. 138 137 5.1.1 Online social network . 139 5.1.2 Censorship-resistant social networking . 141 5.1.3 Redaction with integrity . 142 5.1.4 Health care data sharing . 143 5.2 UPSS: the user-centric private sharing system . 144 5.2.1 Immutable DAGs . 146 5.2.2 Mutable Filesystem API . 147 5.2.3 Share Control Module . 148 5.2.4 VFS layer(s) . 151 5.3 Related Work . 151 5.3.1 Online Social Network Systems and Tool . 152 5.3.2 File systems . 154 5.4 Conclusion . 156 66.1 UPSS: Background the user-centric . private . sharing . .system . 165 163 6.1.1 Preliminaries . 165 6.2 UPSS: the user-centric private sharing system . 166 vii 6.2.1 BlockStore layer . 167 6.2.2 Immutable DAGs . 169 6.2.3 Mutable Filesystem API . 170 6.3 Case studies . 172 6.3.1 Benchmark description . 173 6.3.2 UPSS as a local filesystem . 175 6.3.2.1 Snapshots and consistency . 177 6.3.2.2 Performance comparisons . 178 6.3.2.3 Deduplication . 180 6.3.2.4 Macro-benchmark . 185 6.3.3 UPSS as a network filesystem . 185 6.3.3.1 Remote block store . 187 6.3.3.2 Performance comparison . 188 6.3.4 UPSS as a global filesystem . 189 6.3.4.1 Performance comparison . 189 6.3.5 UVC: UPSS Version Control System . 194 6.3.5.1 Version Control Server . 199 6.3.5.2 Version Control Client . 200 6.3.5.3 Version Control System Evaluations . 201 6.4 Related work . 207 6.5 Future work . 209 6.5.1 FFI . 209 6.5.2 Expansion of Version Control System . 209 6.5.3 Parallelism . 210 6.5.4 Structured files . 210 6.5.5 Hiding access patterns . 211 6.6 Conclusion . 211 viii 7 Summary 220 7.1 Future work . 223 ix List of Tables 2.1 Specifications of real standard datasets . 39 2.2 Specification of communities of the datasets . 39 2.3 Speed up in different datasets . 44 3.1 Specifications of real standard datasets. 66 3.2 Specification of communities in the real standard datasets. 66 3.3 MC and CI2 comparison . 71 4.1 Centralized privacy approaches . 94 4.2 Decentralized privacy approaches . 102 4.3 The online time patterns for three nodes . 118 5.1 Use cases’ requirements . 139 x List of Figures 2.1 A sample network with its communities . 33 2.2 Memory usage comparisons . ..
Recommended publications
  • Truenas® Privacy and Security Compliance Features
    TRUENAS® PRIVACY AND SECURITY COMPLIANCE FEATURES Risk accountability EPR HIPAA information users PCI DSS ZFS HITECH TrueNAS ePHI branches corporate EPH health internal storage Compliance FreeNAS external process Audit encryption management patient GUI GDPRBackup data GRCFIPS 140-2 FreeBSD technology Governance enterprise NO MATTER ITS SIZE, EVERY BUSINESS TRUENAS PROVIDES FEATURES FOR REAL OPERATES IN A REGULATED ENVIRONMENT SECURITY AND COMPLIANCE Thanks to legislation like the European Union General TrueNAS is a unified file, block and object storage Data Protection Regulation (GDPR), it’s no longer only solution built on the OpenZFS self-healing file system government and medical providers that need to comply that supports hybrid and all-flash configurations. Unlike with strict privacy and security regulations. If your many competing storage systems, each TrueNAS scales business handles credit card information or customer from a few workgroup terabytes to multiple private personal information, you must navigate an alphabet cloud petabytes, all with a common user experience and soup of regulations that each include distinct obligations full data interoperability. and equally-distinct penalties for failing to comply with those obligations. From PCI DSS to the GDPR to TrueNAS uses a myriad of network and storage HIPAA, a common theme of data security stands out as encryption techniques to safeguard your data a fundamental requirement for regulation compliance throughout its life cycle and help assure your regulation and TrueNAS is ready
    [Show full text]
  • Ed 377 034 Title Institution Pub Date Note Available
    DOCUMENT RESUME ED 377 034 SE 054 362 TITLE Education & Recycling: Educator's Waste Management Resource and Activity Guide 1994. INSTITUTION California State Dept. of Conservation. Sacramento. Div. of Recycling. PUB DATE 94 NOTE 234p. AVAILABLE FROMCalifornia Department of Conservation, Division of Recycling, 801 K Street, MS 22-57, Sacramento, CA 95814. PUB TYPE Guides Classroom Use Teaching Guides (For Teacher) (052) EDRS PRICE MF01/PC10 Plus Postage. DESCRIPTORS Bilingual Instructional Materials; *Class Activities; Constructivism (Learning); *Educational Resources; Elementary Secondary Education; *Environmental Education; Evaluation Methods; *Recycling; Solid Wastes; Teaching Guides; *Waste Disposal; Worksheets IDENTIFIERS *California ABSTRACT This activity guide for grades K-12 reinforces the concepts of recycling, reducing, and reusing through a series of youth-oriented activities. The guide incorporates a video-based activity, multiple session classroom activities, and activities requiring group participation and student conducted research. Constructivist learning theory was considered during the development of activities. The guide is divided into the following sections:(1) 12 elementary and mieldle school classroom activities;(2) eight middle and high school classroom activities;(3) school recycling programs;(4) trivia, facts, and other information;(5) listing of 338 supplementary materials (activity, booklets, coloring and comic books, books, catalogs, curricula, extras, magazines, recycling programs, and videos);(6) listing of 39 environmental organizations; (7) approximately 1,300 California local government and community contacts; and (8)a glossary. Many activities incorporate science, history and social science, English and languege arts, and mathematics and art. Most activities include methods for teacher and student evaluations. Spanish translations are provided for some activity materials, including letters to parents, several take-home activities and the glossary.
    [Show full text]
  • The Illusion of Space and the Science of Data Compression And
    The Illusion of Space and the Science of Data Compression and Deduplication Bruce Yellin EMC Proven Professional Knowledge Sharing 2010 Bruce Yellin Advisory Technology Consultant EMC Corporation [email protected] Table of Contents What Was Old Is New Again ......................................................................................................... 4 The Business Benefits of Saving Space ....................................................................................... 6 Data Compression Strategies ....................................................................................................... 9 Data Compression Basics ....................................................................................................... 10 Compression Bakeoff .............................................................................................................. 13 Data Deduplication Strategies .................................................................................................... 16 Deduplication - Theory of Operation ....................................................................................... 16 File Level Deduplication - Single Instance Storage ................................................................. 21 Fixed-Block Deduplication ....................................................................................................... 23 Variable-Block Deduplication .................................................................................................. 24 Content-Aware Deduplication
    [Show full text]
  • Newest Trends in High Performance File Systems
    Newest Trends in High Performance File Systems Elena Bergmann Arbeitsbereich Wissenschaftliches Rechnen Fachbereich Informatik Fakult¨atf¨urMathematik, Informatik und Naturwissenschaften Universit¨atHamburg Betreuer Julian Kunkel 2015-11-23 Introduction File Systems Sirocco File System Summary Literature Agenda 1 Introduction 2 File Systems 3 Sirocco File System 4 Summary 5 Literature Elena Bergmann Newest Trends in High Performance File Systems 2015-11-23 2 / 44 Introduction File Systems Sirocco File System Summary Literature Introduction Current situation: Fundamental changes in hardware Core counts are increasing Performance improvement of storage devices is much slower Bigger system, more hardware, more failure probabilities System is in a state of failure at all times And exascale systems? Gap between produced data and storage performance (20 GB/s to 4 GB/s) I/O bandwidth requirement is high Metadata server often bottleneck Scalability not given Elena Bergmann Newest Trends in High Performance File Systems 2015-11-23 3 / 44 Introduction File Systems Sirocco File System Summary Literature Upcoming technologies until 2020 Deeper storage hierarchy (tapes, disc, NVRAM . ) Is traditional input/output technology enough? Will POSIX (Portable Operating System Interface) I/O scale? Non-volatile memory Storage technologies (NVRAM) Location across the hierarchy Node local storage Burst buffers New programming abstractions and workflows New generation of I/O ware and service Elena Bergmann Newest Trends in High Performance File Systems 2015-11-23
    [Show full text]
  • Oracle for SAP Technology Update, Volume 22
    ® ® Oracle for SAP TECHNOLOGY UPDATE No. 22 Oracle for SAP, May 2013 www.oracle.com/sap Please download current version of the Oracle for SAP Technology Update Nr. 22 www.oracle.com/sap Hardware and Software CONTENTS Engineered to Work Together 3 Editorial 4 Oracle Engineered Systems for SAP 6 Oracle Exadata Database Machine for SAP customers 12 Oracle Exadata Database Machine Start Up Pack for SAP customers 14 Oracle Exalogic Elastic Cloud certified for SAP NetWeaver 7 18 SPARC SuperCluster optimized solution for SAP customers 20 ATIVAS on SPARC SuperCluster 22 Oracle Database Appliance Certified for SAP customers 24 Oracle VM server for X86 virtualization now available for SAP customers 26 Oracle Exadata for SAP at Lion 30 Oracle Exadata for SAP at Dongfeng 32 Infosys-Oracle Exadata for SAP consolidation solution 34 Atos IT – Oracle Exadata Services for SAP Customers 36 Oracle Exadata for SAP at Shenhua 38 Oracle Exadata for SAP at Koctas 42 SAP customer with Oracle Exadata Database Machine in production 45 Why SAP Customers Deploy Exadata 48 Oracle Exadata for SAP at Glencore 52 Oracle Database 11g Release 2 for SAP 58 Oracle Database Migration Technologies 71 Oracle HA Solutions Certified by SAP for Integration with SAP NetWeaver 72 Oracle Cloud File System for SAP 75 Real Application Testing for SAP customers 78 Oracle Advanced Compression at Indesit 82 Oracle Solaris Cluster 4.0 for SAP at City of Nuremberg 84 Oracle Advanced Compression at ConAgra Foods 89 Oracle RAC and ASM at EDEKA Lunar 92 Oracle Advanced Customer Services (ACS) at AkzoNobel -Triple O 94 Helsana DB2 migration to Oracle Database 96 Oracle Advanced Customer Services (ACS) for SAP 101 Oracle Advanced Customer Services (ACS) at Centrica 1021 Oracle Advanced Customer Services (ACS) O2O-NXP Semiconductors N.V.
    [Show full text]
  • Fancy Filesystems a Look at Some of the Many Options We Have for Serving up Data to Users
    Fancy Filesystems A look at some of the many options we have for serving up data to users. With thanks to Winnie, Sam, Rob and Raul. Disclaimer - I don’t know much, but this is about starting conversations. Old School (1) - NFS/ClassicSE style ● A single server with a chunky volume, presented over nfs or behind a single protocol endpoint. ○ I’d say this is how we did things “back in the day”, but I’d put money on everyone in this room having an nfs box or two sitting in their cluster - or even back at home! ○ The ClassicSE is less common. ● Retro is back in fashion though, and that’s not necessarily a bad thing. ○ It’s easy to have over 100TB in a 2U box. ○ Decent in-rack networks are commonplace, so these boxes can be well connected. ○ Easy to admin, well understood. ○ Xroot (or XCache) servers are the new ClassicSE ● Of course there are some limitations and concerns. ○ IOPs, Bandwidth and Resilience are all factors when dealing with single servers. Old School (2) - The not so classic SEs. The early naughties saw sites deploy what is a very griddy solution for their storage with DPM and DCache SEs. ● From a distance they both look very similar - protocol gateways on every pool server, a single metadata server pulling things together in a giant virtual filesystem. ● Very grid-specific solution. ● Easiest access via gfal (or lcg…) tools. ● Protocols very grid focused. Rise of ZFS In recent years some of us have been ditching raid cards for ZFS. Raid 6 is dead, long live RaidZ3! ● Although I for one do not think I’m leveraging enough of the ZFS features (or whether or not we can even leverage them).
    [Show full text]
  • Brochure to Find the Sessions That Meet Your Interests, Or Check out Pp
    April 10–15, 2005 Marriott Anaheim Anaheim, CA Join our community of programmers, developers, and systems professionals in sharing solutions and fresh ideas on topics including Linux, clusters, security, open source, system administration, and more. April 10–15, 2005 KEYNOTE ADDRESS by George Dyson, historian and author of Darwin Among the Machines Design Your Own Conference: Combine Tutorials, Invited Talks, Refereed Papers, and Guru Sessions to customize the conference just for you! 5-Day Training Program 3-Day Technical Program Choose one subject or mix and Evening events include: April 10–14 April 13–15, 4 Tracks match to meet your needs. • Poster and Demo Sessions • Now with half-day tutorials • General Session Themes include: • Birds-of-a-Feather Sessions • More than 35 to choose from Refereed Papers • Coding • Vendor BoFs • Learn from industry experts • FREENIX/Open Source • Networking • Receptions • Over 15 new tutorials Refereed Papers • Open Source • Invited Talks • Security • Guru Is In Sessions • Sys Admin Register by March 21 and save up to $300 • www.usenix.org/anaheim05 CONFERENCE AT A GLANCE Sunday, April 10, 2005 7:30 a.m.–5:00 p.m. ON-SITE REGISTRATION 9:00 a.m.–5:00 p.m. TRAINING PROGRAM 6:00 p.m.–7:00 p.m. WELCOME RECEPTION 6:30 p.m.–7:00 p.m. CONFERENCE ORIENTATION Monday, April 11, 2005 7:30 a.m.–5:00 p.m. ON-SITE REGISTRATION 9:00 a.m.–5:00 p.m. TRAINING PROGRAM 8:30 p.m.–11:30 p.m. BIRDS-OF-A-FEATHER SESSIONS CONTENTS INVITATION FROM THE PROGRAM CHAIRS 1 Tuesday, April 12, 2005 7:30 a.m.–5:00 p.m.
    [Show full text]
  • Volume 154 November, 2019 GIMP Tutorial: Reflective Water Effect
    Volume 154 November, 2019 GIMP Tutorial: Reflective Water Effect Short Topix: Kernel Lockdown Feature Coming To Linux De-Googling Yourself, Part 6 Casual Python, Part 10 How I Used The wget Linux Command To Recover Lost Images Mind Your Step: Part 3 PCLinuxOS Recipe Corner: Spinach, Ricotta and Sausage Calzones PCLinuxOS Family Member Spotlight: rolgiati Internet Archive Releases 2,500 More MS-DOS Games PCLinuxOS Magazine And more inside ... Page 1 In This Issue... 3 From The Chief Editor's Desk... 4 Screenshot Showcase The PCLinuxOS name, logo and colors are the trademark of 5 GIMP Tutorial: Reflective Water Effect Texstar. 7 Screenshot Showcase The PCLinuxOS Magazine is a monthly online publication 8 Short Topix: Kernel Lockdown Feature Coming To Linux containing PCLinuxOS-related materials. It is published primarily for members of the PCLinuxOS community. The 11 Screenshot Showcase magazine staff is comprised of volunteers from the PCLinuxOS community. 12 PCLinuxOS Recipe Corner: Spinach, Ricotta and Sausage Calzones Visit us online at http://www.pclosmag.com 13 ms_meme's Nook: Going Up To Linux This release was made possible by the following volunteers: 14 Internet Archive Releases 2,500 More MS-DOS Games Chief Editor: Paul Arnote (parnote) Assistant Editor: Meemaw 16 Casual Python, Part 10 Artwork: Sproggy, Timeth, ms_meme, Meemaw Magazine Layout: Paul Arnote, Meemaw, ms_meme 23 Screenshot Showcase HTML Layout: YouCanToo 24 PCLinuxOS Family Member Spotlight: rolgiati Staff: ms_meme CgBoy 26 De-Googling Yourself, Part 6 Meemaw YouCanToo Gary L. Ratliff, Sr. Pete Kelly 30 Screenshot Showcase Daniel Meiß-Wilhelm phorneker daiashi Khadis Thok 31 Mind Your Step, Part 3 Alessandro Ebersol Smileeb 34 PCLinuxOS Bonus Recipe Corner: Impossibly Easy Vegetable Pie Contributors: onkelho 35 How I Used The wget Linux Command To Recover Lost Images 37 Screenshot Showcase The PCLinuxOS Magazine is released under the Creative 38 Special Drivers In PCLinuxOS, Part 1 Commons Attribution-NonCommercial-Share-Alike 3.0 Unported license.
    [Show full text]
  • Newest Trends in High Performance File Systems
    Newest Trends in High Performance File Systems — Seminarbericht — Arbeitsbereich Wissenschaftliches Rechnen Fachbereich Informatik Fakultät für Mathematik, Informatik und Naturwissenschaften Universität Hamburg Vorgelegt von: Elena Bergmann E-Mail-Adresse: [email protected] Matrikelnummer: 6525540 Studiengang: Informatik Betreuer: Julian Kunkel Hamburg, den 30.03.2016 Abstract File Systems are important for storage devices and therefore also important for high computing. This paper describes file systems and parallel file systems in general and the Sirocco File System in detail. The development of Sirocco shows how it could handle the big gap between produced data from the processor and the data rate that can be stored by current storage systems. Sirocco is inspired by loose coupling of peer-to-peer systems, where clients can join and exit the network any time without endangering the stability of the network. The user gets the ability to chose their storage location and the system replicates files and servers to maintain its health. Contents 1 Introduction 4 2 File Systems 5 2.1 File Systems in General . 5 2.2 Parallel File Systems . 6 3 Sirocco File System 11 3.1 Design Principles . 11 3.2 System . 11 3.2.1 Network . 11 3.2.2 Namespace . 12 3.2.3 Data Operations and Search . 13 3.2.4 Storage and Updates . 13 3.3 First Results . 14 4 Summary 16 Bibliography 17 List of Figures 18 Appendices 19 A Burst buffers 20 3 1. Introduction This chapter describes the current situation of file systems in high computing and some technologies that will be released by 2020.
    [Show full text]
  • Debian Security Update - Php5
    Debian Security Update - php5 AlienVault ID: ENG-107845 Description: An issue was discovered in PHP before 5.6.35, 7.0.x before 7.0.29, 7.1.x before 7.1.16, and 7.2.x before 7.2.4. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process. CVE ID: CVE-2018-10545 CVSS: 3.7 Debian Security Update - php5 AlienVault ID: ENG-107845 Description: An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. An infinite loop exists in ext/iconv/iconv.c because the iconv stream filter does not reject invalid multibyte sequences. CVE ID: CVE-2018-10546 CVSS: 3.7 Debian Security Update - php5 AlienVault ID: ENG-107845 Description: An issue was discovered in ext/phar/phar_object.c in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5. There is Reflected XSS on the PHAR 403 and 404 error pages via request data of a request for a .phar file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2018-5712. CVE ID: CVE-2018-10547 CVSS: 3.2 Debian Security Update - php5 AlienVault ID: ENG-107845 Description: An issue was discovered in PHP before 5.6.36, 7.0.x before 7.0.30, 7.1.x before 7.1.17, and 7.2.x before 7.2.5.
    [Show full text]
  • Graph-Radial.Pdf
    beep yap yade xorp xen wpa wlcs wcc vzctl vg vast v86d ust udt ucx tup ttyd tpb tgt tboot tang t50 sxiv sptag spice shim sbd rr rio rear rauc rarpd qsstv qrq qps qperf atop acpi 0ad apr zyn zpaq yash xqf wrk wit pcb pam p4est oscar orpie ondir ola oflib o2 ntp nsd ns3 ns2 npd6 nnn nng nield kitty kcov kbtin k3b jove ircii ipip ipe iotjs ion iitii iftop anet alevt agda afuse afnix adcli acct gpart matplotlib numexpr zhcon vrrpd fxload dov4l yavta yacpi wvdial wsjtx wmifs weston vtgrab vmpk vmem vkeybd urfkill ulogd2 uftrace udevil tvtime tucnak topline tiptop tcplay tayga sysstat sysprof svxlink libgisi libemf libdfp libcxl libbpf libacpi latrace kpatch khmer elastix dvblast crystal cpustat chrony casync boxfort bowtie bilibop axmail awesfx armnn aqemu acpitail webdis vnstat vnlog vlock vibe.d vbrfix vblade validns urweb unscd ncrack mystiq mtools mruby mpqc3 mothur mm3d mkcue miredo midish meliae mclibs maude lwipv6 ltunify lsyncd libvhdi libsfml libscca librepo librelp libregf libfwnt libfvde libevtx libcreg libbfio libalog kwave knockd kismet jmtpfs jattach ivtools isc-kea anfo baresip badger pigpio babeld asylum 3depict parole-dev esekeyd twclock thermald thc-ipv6 tftp-hpa te923con tarantool systemc syslinux sysconfig suricata supermin subread spacefm quotatool qjoypad qcontrol qastools pystemd pps-tools powertop pommed ifhp ffmpegfs faultstat f2fs-tools eventstat ethstatus espeakup embree elogind ebtables earlyoom digitools dbus-cpp darktable cubemap crystalhd criterion cputool circlator cen64-qt can-utils bolt-lmm bluedevil blktrace
    [Show full text]
  • Advanced Analytics in Business [D0s07a] Big Data Platforms & Technologies [D0s06a] Hadoop and Mapreduce Spark Streaming Analytics Overview
    Advanced Analytics in Business [D0S07a] Big Data Platforms & Technologies [D0S06a] Hadoop and MapReduce Spark Streaming Analytics Overview Big data Hadoop MapReduce Spark SparkSQL MLlib Streaming analytics and other trends 2 The landscape is incredibly complex 3 Heard about Hadoop? Spark? H2O? Many vendors with their "big data and analytics" stack Amazon There's always "roll your own" Cloudera Open source, or walled garden? Datameer Support? DataStax What's up to date? Dell Which features? Oracle IBM MapR Pentaho Databricks Microsoft Hortonworks EMC2 4 Two sides emerge Infrastructure "Big Data" "Integration" "Architecture" "Streaming" 5 Two sides emerge Analytics "Data Science" "Machine Learning" "AI" 6 There's a difference 7 Previously In-memory analytics Together with some intermediate techniques: mostly based on disk swapping and directed acyclic execution graphs Now: moving to the world of big data Managing, storing, querying data Storage and computation in a distributed setup: over multiple machines And (hopefully still, though it will be difficult for a while...): analytics 8 Hadoop 9 Hadoop We all know of Hadoop and hear it being mentioned every time a team is talking about some big daunting task related to the analysis or management of big data Have lots of volume? Hadoop! Unstructured data? Hadoop! Streaming data? Hadoop! Want to run super-fast machine learning in parallel? You guessed it… Hadoop! So what is Hadoop and what is it not? 10 History The genesis of Hadoop came from the Google File System paper that was published in 2003 Spawned another research paper from Google: MapReduce Hadoop itself however started as part of a search engine called Nutch, which was being worked on by Doug Cutting and Mike Cafarella 5k lines of code for NDFS (Nutch Distributed File System) and 6k lines of code for MapReduce In 2006, Cutting joined Yahoo! to work in its search engine division.
    [Show full text]