Shield in the Cloud

Total Page:16

File Type:pdf, Size:1020Kb

Shield in the Cloud Shield in the Cloud Working together to eradicate corruption by harnessing technology innovation 2 3 INTRODUCTION INTRODUCTION Message from C5 Andre Pienaar In the arid beauty of the Karoo desert in As the headlines and history books show us, a South Africa, where I grew up, when you strong and lasting peace in post conflict countries see a cloud, it is good news. The promise of is not possible without good governance. The rain and its transformative power is on the Middle East and Africa, corruption and innovation horizon. We knew that soon a beautifully are opposing forces. Where one is present, the bountiful harvest of flowers and life would other is invariably absent. Innovation thrives on burst forth from the barren landscape before good governance. Corruption corrodes and kills our eyes. Today, cloud computing offers us this innovation and opportunity thereby wasting the same incredible transformative power with talent of generations. Through this challenge, we unprecedented opportunities for innovation aim to strengthen the virtuous cycle between and entrepreneurship. good governance, innovation and opportunity, which the entrepreneurs with whom we partner Cloud is taking the computing power we have as investors need to thrive. come to know first on our personal computers From back row left to right: Jamie Lowther-Pinkerton LVO, MBE, DL, Ambassador George Moose, Raymond Donovan, Derek Maltz, and on-premises servers and industrializing As Admiral Mike Mullen, U.S. Navy admiral who Andy Powell, Andre Pienaar, GEN Keith Alexander (Ret.), Sir Iain Lobban, Alex Newman, Sheldon Himelfarb, Nancy Lindborg, Kurt Scherer, Eva Dimitriadis, Cheryl Carolus, Georgina Callander, Moira Andrews, Tami Longaberger, Sir Graeme Lamb its capacity with computing infrastructure on served as the chairman of the Joint Chiefs of a global scale, for everyone’s benefit. Amazon Staff (2007–11), said, “corruption is corrosive pioneered this by investing billions of dollars to to national and international security.” Thus, We are stronger as a collective than alone. this Shield in the Cloud white paper highlights build multiple industrial sized computing centres it is in our collective interest to stand against General Keith Alexander says, “In a networked the discussions we held and the experts around the world, and networking them cost- it. Corruption gives rise to vast criminal world, collective security is the best security we engaged with through the course of the effectively with high-speed fibre optic cables. enterprises, such as the toxic stream of illegal model.” However, fighting organised corruption is programme, enabling us to confront a universal This means that we need less capital and less narcotics whose damaging influence floods one of the loneliest tasks. Invariably, perpetrators issue through a global coalition of thinkers and infrastructure to grow organizations. We can global trade routes and ultimately poisons seek to isolate, target, and diminish those innovators, aiming to make the world a more displace capital with technology to build, scale our nations. Running through the same veins working towards the greater good. The same transparent and responsible place. Together, and innovate globally on an unprecedented of the illicit global trading routes that carry perpetrators often have reach, hiring lawyers, we can amplify counter-corruption efforts by scale. The power of cloud computing to scale heroin, cocaine and opioids, there are myriad investigators and public relations advisers of rapidly scaling and accelerating the innovative innovation, to reduce the cost of computing, and menaces and threats, ranging from human their own. The bigger the syndicate, the further ideas and platforms. More importantly, we to increase its accessibility to everyone is one trafficking to terrorist finance. Moreover, these their influence extends. This competition enabled can contribute to the future of the fight against of the drivers of growth in the global economy. same routes increasingly form the lines of us to find and support the leaders who are corruption by bringing the issue to the forefront, attack that adversaries are pursuing against our Peacetech is the purposeful application of the innovators in the fight against corruption and providing a collective initiative for our common nations, while camouflaging their hostile intent innovation that cloud computing enables for its causes. We then connected organizations defence, and by lighting the fire of the next in a twilight of war and peace. The corruption good. Through cloud-enabled innovation, we fighting corruption to build collective security generation of ideas and inventions to carry that enables these illegal networks and routes can rapidly scale technology to immediately while simultaneously accelerating the pace forth the fight against corruption now and well to thrive are a clear and present danger. With have strategic impact. Used for good, this can of anti-corruption innovation by sharing best into the future. each day, the problem becomes increasingly sustain national and international security gains practices across this network. complex and thus we need new tools and while building a strong peace and securing our models to combat it. Ultimately, as Former Vice Like the clouds over the Karoo, our “Shield in the children’s future. We launched the first global President Joe Biden rightly points out, “fighting Cloud” offers the hope of a better future. Acting anti-corruption challenge in order to support corruption is not just about good governance. It as one-part forum and one-part advocacy, the growth and impact of tech innovation in is patriotism, it is self-defence.” fighting the corrosive and destabilising force of corruption. The PeaceTech Accelerator Washington D.C. Contents is the first major international peacetech program powered by cloud innovation Keynote remarks from 6-7 and dedicated to scaling startups GEN Keith Alexander (Ret.), IronNet: Securing our common defense 6-7 from around the world. Briefing Paper: 8-11 Peacetech is recognized as the application of technology Combatting Corruption: Our Collective Responsibility 8-11 to assist communities in conflict and crisis zones. Innovator Interviews: 12-17 Sheldon Himelfarb, PeaceTech Lab 12-13 Startups are selected based on their ability to produce innovative technologies that manage, mitigate, predict, Steve Fehr, SAP NS2 14-15 or prevent conflict and promote sustainable peace. Mr. Mohamed Ali AlQaed, 16-17 Information & eGovernment Authority of Bahrain Anti-Corruption Innovation roundtable discussion, 18-27 Washington D.C. Partner Perspectives: 28-33 “The introductions and connections we’ve established through the PeaceTech AWS support of ICMEC 28-29 Accelerator have been invaluable.” Jay Collins, Citi 31-33 John Jaeger, Founder and CEO, Hala Systems Cloud Champions: 34-43 Mark Labs: 34-35 “The PeaceTech Accelerator propelled our Technology Innovation providing the tools to fight corruption business towards an inflection point. What PurpleTRAC: New Sanctions Impact Shipping & 36-39 we accomplished in just under 8 weeks Trade Transactions Worldwide would have taken a year and a half.” ProZorro.Sale: Reforming state assets in Ukraine 40-41 Kevin Barrow, Founder and CEO, MARK Labs Ushahidi: Accountability and transparency in the World today 42-43 Anti-Corruption Innovation roundtable discussion, 44-54 London Image courtesy of USIP of courtesy Image 6 7 KEYNOTE REMARKS KEYNOTE REMARKS Securing our common defense Gen. Keith Alexander (Ret.), IronNet Defending our Nations in cyberspace requires analog community to digital-analog to completely access and distribution of real-time cyber digital. This transformation happened not only in information among companies in the private networks but across the cyber spectrum and this sector, and between the public and private relentless progress is not subsiding. The amount of sector. Delays in sharing that information unique information created this past year is more than the last 5000 years combined. The amount creates gaps adversaries can and will exploit. of new technology tools launched each year is From our perspective, the cloud offers a unique growing exponentially. The top 10 in-demand jobs The private sector needs to find a way to build a aimed at bringing technology to bear in some of opportunity to rapidly share, correlate and in 2017 did not exist 10 years ago. The winds of collaborative and enduring framework to bolster society’s most intractable challenges like corruption. enrich data amongst all of the key participants. change are now full gales. the nation’s “common defence.” The myriad tools of technology now offer solutions At the height of the Iraq War, we struggled to Embracing transformation and adapting in order never dreamed of before. Organizations are provide signal intelligence in real-time that could In the military, elements do not fight alone but as to remain along the leading edge is critical not adding visibility to government property sales in effectively help save American lives on the ground. a collective group. Platoons support Companies, only on the battlefield but also in business and Ukraine, illuminating the flow of money between The signal intelligence we were providing was Companies support Battalions, Battalions support government. The digital arena is re-defining how financial supporters of extremist groups, and “historic,” but intelligence is only as good as it is Brigades; combat happens in coordination. Unity we do business,
Recommended publications
  • Cloud Computing: a Taxonomy of Platform and Infrastructure-Level Offerings David Hilley College of Computing Georgia Institute of Technology
    Cloud Computing: A Taxonomy of Platform and Infrastructure-level Offerings David Hilley College of Computing Georgia Institute of Technology April 2009 Cloud Computing: A Taxonomy of Platform and Infrastructure-level Offerings David Hilley 1 Introduction Cloud computing is a buzzword and umbrella term applied to several nascent trends in the turbulent landscape of information technology. Computing in the “cloud” alludes to ubiquitous and inexhaustible on-demand IT resources accessible through the Internet. Practically every new Internet-based service from Gmail [1] to Amazon Web Services [2] to Microsoft Online Services [3] to even Facebook [4] have been labeled “cloud” offerings, either officially or externally. Although cloud computing has garnered significant interest, factors such as unclear terminology, non-existent product “paper launches”, and opportunistic marketing have led to a significant lack of clarity surrounding discussions of cloud computing technology and products. The need for clarity is well-recognized within the industry [5] and by industry observers [6]. Perhaps more importantly, due to the relative infancy of the industry, currently-available product offerings are not standardized. Neither providers nor potential consumers really know what a “good” cloud computing product offering should look like and what classes of products are appropriate. Consequently, products are not easily comparable. The scope of various product offerings differ and overlap in complicated ways – for example, Ama- zon’s EC2 service [7] and Google’s App Engine [8] partially overlap in scope and applicability. EC2 is more flexible but also lower-level, while App Engine subsumes some functionality in Amazon Web Services suite of offerings [2] external to EC2.
    [Show full text]
  • Full Journal, PDF, 19.2 Megabytes
    $2.95 • was The Journal of Washington Apple Pi, Ltd. Volume 14, Number 12 December 1992 Artists on Exhibit ........ Falcon Microsystems ..... 1100 Mcrchanlllc l..Jnc. l.antlo,cr. MO ,., 14 WAP Garage Sale 118 Personalized Christ- mas Cards are Here! 21 Photo CD Review 26 Compression Comparison - Speed ~ ::.~I.Mao")- T~IO~~~I · ~ ... ·11 BusinessTalk 2000 31 . G[llCor-or-~ S..Hotf.ie~~ O S....O....·•>Ot 0 )0 100 150 200 · ~"'°'ll i~::,: I ~ Big Text Machine _,_ Review 58 - Deneba RasterOps 101881 Canvas V3.0 992020 CorrectPrint 300 6789 Costar 245 Fractal Design Supermac 161737 Stingray Trackball( Platinum/Bia ck) 84 142027 Spectrum/24 Series Ill 820 Kensington 101339 Painter 1.2 230 Macromedia 142022 Spectrum/8 LC 500 161395 Notebook keypad 99 102014 Ma croMind Director 3.1 775 142023 Spectrum/8 Series Ill 420 161399 Turbo Mouse V4.0 107 Logitech 102015 Magic 267 142021 Spectrum 8/llsi 500 142025 Spectrum/8•24 PDQ 231445 MouseMan 75 101760 Swivel 3D Pro. 450 825 Quark International 142026 Spectrum/8•24 PDQ si 232054 TrackMan 86 825 Lind ElectronicDesign 102051 XPress 3.1 545 172018 Thunderstorm 808 231142 Battery Charger for PB140/170 142 Specular International 172019 Thunderstorm Pro 2739 101370 lnfini-D v.2.0 231443 Battery Charger for PB100 120 625 Supra Corporation Microtouch 101693 Replicas 1 180 131752 V.32 MacPac 285 101693 Replicas 2 180 161791 The UnMouse 140 131754 V.32bis MacPac 345 Silicon Sports Strata Incorporated Wacom 101739 StrataVision 3D V2.5 231363 H er ad Heat Sens. Mouse Pad 600 232055 12 x 12 Electrostatic Tablet
    [Show full text]
  • Recent Changes in Europe's Cocaine Market
    RAPID COMMUNICATION Recent changes in Europe’s cocaine market Results from an EMCDDA trendspotter study December 2018 Recent changes in Europe’s cocaine market Results from an EMCDDA trendspotter study December 2018 I Legal notice This publication of the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) is protected by copyright. The EMCDDA accepts no responsibility or liability for any consequences arising from the use of the data contained in this document. The contents of this publication do not necessarily reflect the official opinions of the EMCDDA’s partners, any EU Member State or any agency or institution of the European Union. Luxembourg: Publications Office of the European Union, 2018 Print ISBN 978-92-9497-363-4 doi:10.2810/49990 TD-04-18-918-EN-C PDF ISBN 978-92-9497-364-1 doi:10.2810/801683 TD-04-18-918-EN-N © European Monitoring Centre for Drugs and Drug Addiction, 2018 Reproduction is authorised provided the source is acknowledged. Photo credits: cover, iStockphotos.com For any use or reproduction of photos or other material that is not under the European Monitoring Centre for Drugs and Drug Addiction copyright, permission must be sought directly from the copyright holders. Recommended citation: European Monitoring Centre for Drugs and Drug Addiction (2018), Recent changes in Europe’s cocaine market: results from an EMCDDA trendspotter study, Publications Office of the European Union, Luxembourg. Praça Europa 1, Cais do Sodré, 1249-289 Lisbon, Portugal Tel. +351 211210200 [email protected] I www.emcdda.europa.eu
    [Show full text]
  • Celebration of Student Scholarship
    Program and Abstracts Celebration of Student Scholarship Showcase of Student Research, Scholarship, Creative Work, and Performance Arts April 24, 2019 Celebration of Student Scholarship April 24, 2019 Program Overview Adron Doran University Center 7:45 – 8:30 am All student scholars and faculty mentors are to register and pick up programs and name badges (3rd floor Adron Doral University Center), Posters should be set-up at this time and PowerPoints loaded. 8:30 – 10:15 am Oral Presentations (3rd Floor Adron Doran University Center, Rooms 319, 320, 321, 322, 325, 326 and 329) 10:15 – 10:30 am Break 10:30 – 11:45 am Oral Presentations 11:45 – 12:00 pm Break 12:00 – 1:15 pm Oral Presentations 1:15 – 3:00 pm Poster Presentations (Banquet Room, 3rd Floor, Adron Doran University Center (posters left up until 5:00 pm) 3:00 – 4:00 pm Reception (Banquet Room, 3rd Floor, Adron Doran University Center 4:00 – 4:15 pm Gallaher Memorial Music Performance 4:15 – 5:00 pm Awards 5:00 pm Removal of Posters Special Recognition .................................................................................................................. 2 Posters-at-the-Capitol Participants ........................................................................................ 3 Welcome Statements ....................................................................................................... 4 Jay Morgan, President Robert Albert, Interim Provost and Vice President for Academic Affairs Michael Henson, Associate Vice President for Research and Dean of the Graduate
    [Show full text]
  • W Page 6 Blue Team Edges White Team 7-0 Page 8 Vol. 75 No. 20 Mercyhurst
    THE STUDENT NEWSPAPER OF MERCYHURST COLLEGE SINCE 1929 ARTS & ^ ENTERTAINMENT Blue team Break out the edges white castinets: Carmen' team 7-0 electrifies the PAC ::W page 6 page 8 Vol. 75 No. 20 Mercyhurst College 501 E. 38th St. Erie, Pa. 16546 May 9, 2002 Senior Awards recipients announced By Kelly Rose Duttine dent speaker for the commencement ent, is awarded to Annie DeMeo. The Contributing writer exercises. Congratulations to the alumni committee sponsors this X winner of the Carpe Diem award, award. f As the days until graduation do* Billy Byrnes. The Frank Barry Leadership Award crease, excitement and anticipation The Bishop's Award for Academic is presented to a senior who has of the events surrounding com- Excellence, sponsored by the Dio- shown superior leadership and in- mencement increase for Mercyhurst cese of Erie, is presented to a gradu- volvement with Mercyhurst Student seniors, One of these events is the ating senior who is the most outstand- Government. The senior must exem- presentation of the coveted Senior ing academically. This award will plify the characteristics of Frank Awards. The President's Cabinet has also be presented at the Graduation Barry, one of t h e first m a l e presidents been selecting outstanding seniors to Awards dinner on May 17,2002. The of Mercyhurst Student Government.) be honored since 1996. Department winner ofthis year's Bishop's Award Congratulations to the co-recipients chairs and faculty members nominate for Academic Excellence is Christine of the Frank Barry Leadership students that they feel are most de- Roos.
    [Show full text]
  • A Classification and Comparison Framework for Cloud Service Brokerage Architectures
    JOURNAL OF LATEX CLASS FILES, VOL. 6, NO. 1, JANUARY 2007 1 A Classification and Comparison Framework for Cloud Service Brokerage Architectures Frank Fowley, Claus Pahl, Pooyan Jamshidi, Daren Fang, Xiaodong Liu Abstract—Cloud service brokerage and related management and marketplace concepts have been identified as key concerns for future cloud technology development and research. Cloud service management is an important building block of cloud architectures that can be extended to act as a broker service layer between consumers and providers, and even to form marketplace services. We present a 3-pronged classification and comparison framework for broker platforms and applications. A range of specific broker development concerns like architecture, programming and quality are investigated. Based on this framework, selected management, brokerage and marketplace solutions will be compared, not only to demonstrate the utility of the framework, but also to identify challenges and wider research objectives based on an identification of cloud broker architecture concerns and technical requirements for service brokerage solutions. We also discuss emerging cloud architecture concerns such as commoditisation and federation of integrated, vertical cloud stacks. Index Terms—Cloud Broker; Service Brokerage; Architecture Patterns; Cloud Broker Classification; Service Management. F 1INTRODUCTION perspective. Marketplaces, like app stores, are broker Several organisations active in the cloud technology applications that assemble and provide end-user ser- area, such as Gartner, Forrester and NIST [17], [14], vices. These broker applications often run on cloud [27], have identified cloud service brokerage as an platforms with specific broker-oriented capabilities. important business model, but also as an architectural This classification framework is based on a broader challenge that needs to explore how to best construct classification in terms of capability and feature cat- broker applications on top of suitable platforms.
    [Show full text]
  • Book of Abstracts
    Sevilla, 21-24 septiembre 2014 Book of Abstracts Supported by: #JdBI2014 Book of Abstracts Index of Kenynote Lectures ...............................................................................................3 of Oral Presentations per Topics Highlights ...........................................................................................................5 Metagenomics ...................................................................................................8 Integrative Biology ....................................................................................... 10 Medical Informatics ................................................................................... 13 Phylogeny / Evolution ................................................................................. 16 Structure / Function ..................................................................................... 19 Student Symposium ..................................................................................... 22 of Posters per Topics Highlights ........................................................................................................ 25 Metagenomics .................................................................................................27 Integrative Biology ....................................................................................... 28 Medical Informatics ...................................................................................... 49 Phylogeny / Evolution ................................................................................
    [Show full text]
  • Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing Jacques Bou Abdo, Thomas Bourgeau, Jacques Demerjian, Hakima Chaouchi
    Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing Jacques Bou Abdo, Thomas Bourgeau, Jacques Demerjian, Hakima Chaouchi To cite this version: Jacques Bou Abdo, Thomas Bourgeau, Jacques Demerjian, Hakima Chaouchi. Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing. Mobile Information Systems, Hindawi/IOS Press, 2016, pp.7867206. <10.1155/2016/7867206>. <hal-01365364> HAL Id: hal-01365364 https://hal.sorbonne-universite.fr/hal-01365364 Submitted on 13 Sep 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Hindawi Publishing Corporation Mobile Information Systems Volume 2016, Article ID 7867206, 13 pages http://dx.doi.org/10.1155/2016/7867206 Research Article Extended Privacy in Crowdsourced Location-Based Services Using Mobile Cloud Computing Jacques Bou Abdo,1 Thomas Bourgeau,2 Jacques Demerjian,3 and Hakima Chaouchi4 1 Computer Science Department, Notre Dame University-Louaize, Zouk Mosbeh, P.O. Box 72, Lebanon 2UPMC,SorbonneUniversity,LIP6,Paris,France 3Faculty of Sciences, Lebanese University, LARIFA-EDST, Pierre Gemayel Campus, Fanar, Lebanon 4Telecom SudParis, Institut Telecom, CNRS SAMOVAR, UMR 5751, 9 rue Charles Fourier, 91011 Evry, France Correspondence should be addressed to Jacques Bou Abdo; [email protected] Received 28 January 2016; Accepted 19 June 2016 Academic Editor: Michele Amoretti Copyright © 2016 Jacques Bou Abdo et al.
    [Show full text]
  • Cloud Computing Characteristics 3
    Hospital Information Systems Unit 4: Cloud Computing Master in Biomedical Engineering Rodrigo García Carmona Universidad CEU San Pablo Escuela Politécnica Superior Departamento de Tecnologías de la Información Table of Contents 1. Introduction to Cloud Computing 2. Cloud Computing Characteristics 3. Deployment and Service Modes 4. Available Solutions 5. From Virtual Datacenter to Design for Cloud 6. How to Select a Cloud Provider 2 INTRODUCTION TO CLOUD COMPUTING 3 What is Cloud Computing? • The cloud, a buzzword. • Several definitions: – Each source its own. – NIST: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. • In reality, cloud computing is two separate and different things: – The applications offered as a service through the Internet. – The hardware and systems, located in datacenters, that enable the provision of these applications. 4 The Hype Cycle • Cloud computing has reached the Slope of Enlightenment. 5 • On the Rise 2017 Gartner’s Hype Cycle – Blockchain PaaS – Digital Applications for Cloud Computing – Immutable Infrastructure • Sliding Into the Trough – Multicloud – Internal Cloud Service • Climbing the Slope – Serverless PaaS Brokerage – Platform as a Service (PaaS) – Subtenancy – Hybrid IT – Public Cloud Storage • At the Peak – Software-Defined – Application
    [Show full text]
  • U.S. Government Publishing Office Style Manual
    Style Manual An official guide to the form and style of Federal Government publishing | 2016 Keeping America Informed | OFFICIAL | DIGITAL | SECURE [email protected] Production and Distribution Notes This publication was typeset electronically using Helvetica and Minion Pro typefaces. It was printed using vegetable oil-based ink on recycled paper containing 30% post consumer waste. The GPO Style Manual will be distributed to libraries in the Federal Depository Library Program. To find a depository library near you, please go to the Federal depository library directory at http://catalog.gpo.gov/fdlpdir/public.jsp. The electronic text of this publication is available for public use free of charge at https://www.govinfo.gov/gpo-style-manual. Library of Congress Cataloging-in-Publication Data Names: United States. Government Publishing Office, author. Title: Style manual : an official guide to the form and style of federal government publications / U.S. Government Publishing Office. Other titles: Official guide to the form and style of federal government publications | Also known as: GPO style manual Description: 2016; official U.S. Government edition. | Washington, DC : U.S. Government Publishing Office, 2016. | Includes index. Identifiers: LCCN 2016055634| ISBN 9780160936029 (cloth) | ISBN 0160936020 (cloth) | ISBN 9780160936012 (paper) | ISBN 0160936012 (paper) Subjects: LCSH: Printing—United States—Style manuals. | Printing, Public—United States—Handbooks, manuals, etc. | Publishers and publishing—United States—Handbooks, manuals, etc. | Authorship—Style manuals. | Editing—Handbooks, manuals, etc. Classification: LCC Z253 .U58 2016 | DDC 808/.02—dc23 | SUDOC GP 1.23/4:ST 9/2016 LC record available at https://lccn.loc.gov/2016055634 Use of ISBN Prefix This is the official U.S.
    [Show full text]
  • A Hybrid Approach to Distributed Computing Architecture and Implementation
    Mjolnirr: A Hybrid Approach to Distributed Computing Architecture and Implementation Dmitry Savchenko and Gleb Radchenko System Programming Department, South Ural State University, Chelyabinsk, Russia Keywords: Cloud Computing, Cloud Middleware, PaaS, Private Cloud, Mjolnirr. Abstract: A private PaaS enables enterprise developers to leverage all the benefits of a public PaaS to deploy, manage, and monitor applications, while meeting the security and privacy requirements your enterprise demands. In this paper we propose the design and implementation of a Mjolnirr private cloud platform for development of the private PaaS cloud infrastructure. It provides means for custom applications development which uses resources of distributed computing environment. 1 INTRODUCTION Cocaine, AppFog, Stackato) levels of service. Comparing to these solutions, main features of our Cloud computing became very popular during the approach are integrated messaging subsystem, last few decades (Mell and Grance, 2011). This type flexible workload management and UNICORE of resource provisioning offers convenient access to (Streit, 2009) grid environment integration module. computing resources, which makes it easy to use The article contains the following sections. In them for custom services development. section 2 we present the main goals of the Mjolnirr Before the introduction of the cloud computing cloud platform development. In section 3 we concept, there was another distributed computing describe the results of the analysis of existing cloud concept called “grid computing” (Foster and platforms and compare them with our platform. In Kesselman, 2003). It is used by the scientific section 4 we describe the structure of the Mjolnirr community while solving extra-large and resource- platform and the component communication intensive scientific tasks.
    [Show full text]
  • The 17 Annual Boston University Undergraduate Research Symposium
    The 17th Annual Boston University Undergraduate Research Symposium Friday, October 17, 2014 The Undergraduate Research Opportunities Program Boston University www.bu.edu/urop Cover design by Claire Brown with contributions by Christina Fresta 2 Seventeenth Annual Undergraduate Research Symposium Table of Contents Schedule of Poster Presentations 4 List of Featured Researchers 6 Acknowledgments 7 Welcome 8 Information about UROP 9 Featured Student Researchers 14 Student Abstracts Biological Sciences 20 Physical Sciences 48 Social Sciences 70 Arts and Literature 86 Sargent College and Public Health 90 BUSM Basic Sciences 99 BUSM Clinical Sciences 114 Computational and Mathematical Sciences 132 Engineering 139 Student Index 160 Mentor Index 163 Seventeenth Annual Undergraduate Research Symposium 3 Poster Presentations 2nd Floor Ballroom, George Sherman Union 11:00 am – Noon Moona Abdulkerim Tru Hoang Kostantinos Papadopoulos John Adams Irene Hsueh Paige Parrack Anika Adeni Joanne Huang Shama Patel Nathan Barbagallo Kelly Huynh William Pellegrini Taylor Barrow Nikita Jain Sonia Mercedes Perez Arias Neeraj Basu Holly Johnson Gordon Pherribo Elizabeth Becker Natalie Jones Michelle Predi Anna Booras Emma Kalff Cynthia Pyles Marisa Borchardt Alison Kendler Evan Ramos Katherine Boule Srijesa Khasnabish Alanna Raskin Lauren Bufe Akuah Kontor Simone Rauch Nicole Carter Zachary Kopp Marinaliz Reynoso Katrina Catalano Lacin Koro Meredith Richter Catherine Cattley Kathryn Kosteva Mark Roberto Athena Cavounidis Olga Lacki Luke Rosenfeld Zachary Chapasko
    [Show full text]