A Review on Software Testing Approaches for Cloud Applications

Total Page:16

File Type:pdf, Size:1020Kb

A Review on Software Testing Approaches for Cloud Applications Perspectives in Science (2016) 8, 689—691 CORE Metadata, citation and similar papers at core.ac.uk Available online at www.sciencedirect.com Provided by Elsevier - Publisher Connector ScienceDirect jo urnal homepage: www.elsevier.com/pisc A review on software testing approaches ଝ for cloud applications ∗ Tamanna Siddiqui, Riaz Ahmad Department of Computer Science, Aligarh Muslim University, India Received 20 February 2016; received in revised form 9 June 2016; accepted 9 June 2016 Available online 4 July 2016 KEYWORDS Summary Cloud computing has actually been invented to be the latest computing standard that will work several distinctive research areas, such as software testing. Testing cloud applica- Cloud testing; Clustering; tions will keep its unique characteristics that involve more recent testing techniques. Software Prioritization; testing helps to reduce the need for hardware and software services and also provide adaptable Privacy; and valuable cloud platform. Testing within the cloud platform is easily manageable based on Security; new test models and criteria. Prioritization approach is made responsive to build much better relationship between test cases. These test cases are clustered dependent on priority level. Test cases The resources can be used properly by applying load balancing algorithm. Cloud guarantees maximum usage of existing resources. But, security defined as a primary problem in cloud. At the present time, organizations are progressively moving excited about deploying and making use of ready-prepared business applications, with particular short-term to the marketplace. The possible lack of capital budgets for software planning and on principle deployments, along with the swift progression of cloud these are the reasons why one should make the interest on business application. However, these are the interests that help make the SaaS based busi- ness application on-demand. In this paper different approaches has been discussed that will help to extend the cloud environment. Also, the study of several well-known software testing approaches. © 2016 Published by Elsevier GmbH. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Introduction making use of virtual machines (VM) to do testing is not a unique idea. The issue starts when those VM are unavailable as needed. Some issues that faced like servers, data source Software testing is used to find out the functionality and as well as applications not representing virtualized environ- validity of a program over performance and analysis. By ments. To address this challenge migrate the tests way to the cloud. Cloud computing provides you with other norms ଝ of testing agility which gives a paradigm shift that a pay- This article belongs to the special issue on Engineering and Mate- per-use technique but not creating in-house data canters. rial Sciences. ∗ Corresponding author. Tel.: +91 9412273378. The users have the ability improve their computing choices E-mail address: [email protected] (R. Ahmad). to fulfill their requirements on-demand (Prathibhan et al., http://dx.doi.org/10.1016/j.pisc.2016.06.060 2213-0209/© 2016 Published by Elsevier GmbH. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/). 690 T. Siddiqui, R. Ahmad Figure 1 Cloud computing testing techniques. 2014; Doss et al., 2012). It seen to apply virtualized hard- Clustering is a bottom-up clustering method each observa- ware appropriately unrestricted storage also software vital tion starts in its own cluster (Liu et al., 2013). It utilized for thin-client network right to use the infrastructure. By in several field because of it offers ability to use arbitrary putting on prioritization strategies simply to make the most clustering dissimilarity or distance function. Clusters are of the scope and plan the test cases in a sequential order to design by a couple of objects determined by the squared- get the code coverage at the quick rate. Clustering models error objective functions because highly responsive to initial are useful to software providers to find his services to the conditions when various size and non-globular state. Algo- cloud users and helps the service expert to extend use of rithms design by using the part of the data in Partition-based software service toward the cloud nature. Clustering. Once every cluster expands clustering elements and minimizes the sum of squared distance from the mean within every cluster. Moreover it used to minimize the clus- Testing in cloud computing tering criteria by iteratively moving the data between the clusters till an ideal partition is seen. The testing framework in cloud computing consists of four most important techniques (Fig. 1). Load distribution scenarios Prioritization techniques Load balancing aims to improve resource use, extend throughput, eliminate response time and avoid overload Prioritization techniques are used to improve the function of any single resource. Load balancing technique will and give a direction to develop and run test cases. Test involve different levels of the cloud in load balancing deci- cases priority assign by using graph coverage value. It is usu- sion. It mainly found in master slave form (Penmatsa and ally defined as the amount of the complexities that involved Chronopoulos, 2011). The static load balancing algorithms dependent test cases which is determined by total number helpful to defines the job to the node according to the of dependents and greatest path of overall dependents of potential of the node to process new queries. The process is the test case. Weight factors to be used for prioritization calculated on previously ability to use the nodes properties, strategies that are customer priority, requirement complex- working power, space for storing capacity and functions. In ness and volatility (Anitha and Srinath, 2014). High factor dynamic includes several features of nodes functions and values show need for prioritization of test case relating to network capacity. It is also combos of prior gathered details the requirement. Test coverage analysis is simply an amount about the nodes in the cloud. According to the attribute applied in software testing named code coverage analysis gathered, Algorithm assigns and reassigns the task to the (Indumathi and Selvamani, 2015). It deals only source codes nodes dynamically depending on the prior gathered details of program that used within the testing process. The cov- about the nodes in cloud area. In Centralized Load Balanc- erage prioritization practice prioritizes the test cases in ing (CLB) technique, the assigning and arranging actions are decreasing order and determined by the sum of ReqSlice produced by one node that chargeable for keeping the infor- (number of requirements declared by test case) and ReqEx- mation based upon entire cloud set-up. It is usually highly ercise (number of requirements utilized by test case). The overloaded and low fault tolerant (Berander and Andrews, exact time is checked for measuring the expense for every 2005). test case because test case prioritization is performed based on cost examination in cost based prioritization (Mohanty Security mechanism et al., 2011). Diffie—Hellman algorithm offered a method to sharing keys Clustering techniques between sender and receiver for encryption and decryption of information and data. It arranges most group members in Clustering can be considered the key unsupervised learn- a logic ring to sharing DH public keys Salzbrunn et al. (2008); ing situation. So, the other issues it focuses on finding a Liao and Chao (2008). The arbitrary parameters produce new structure in an amount of unlabelled data. Agglomerative shared keys for every message that is exchanged between Software testing approaches for cloud applications 691 Table 1 Software testing techniques in cloud platform. Techniques Sub techniques Quality measurement Test case prioritization techniques DSPT IDT, MFD, CS, RT RBPT RC, CC, TCL CBPT Weight in each row using UWD & WD CEBPT IFT, TST, Whole test case cost Clustering algorithm AC CT, half distance matrix computation K-MC Dataset sizes, overhead at the server side PBC Hedgehog representation of the flow Load balancing scenarios HLB Execution time and total performance SLB Expected response time, fairness index, system utilization DLB Power utilization expense, average response time, Usage rates CLB Capability matrix, load matrix Security mechanism DHA I.F., decryption, computation of point on the curve DESA Profitable rate under toleration distance AES Timing simulation each other. Wang’s approach relates to the security and References safety problems in cloud. It offers data access process that is depending on owner—create user read case. DES algorithm Anitha, M.V., Srinath, 2014. A review on software testing framework needs a 56-bit key in execution and one bit used for odd in cloud computing. Int. J. Comput. Sci. Inf. Technol. 5. parity on every octet. AES plays the role of a substitution- Berander, P. , Andrews, A., 2005. Requirements prioritization. In: permutation network according to a design principle. The Engineering and Managing Software Requirements. Springer, pp. finalized result of cipher text is received by several repeti- 69—94. Doss, R., Kumar, R., Prakash, V. , Krishnan, S.G., 2012. Software as tive transformations known as AES cipher. But it takes extra a service (SaaS) testing challenges — an in-depth analysis. Int. round of communication
Recommended publications
  • The Road Ahead for Computing Systems
    56 JANUARY 2019 HiPEAC conference 2019 The road ahead for Valencia computing systems Monica Lam on keeping the web open Alberto Sangiovanni Vincentelli on building tech businesses Koen Bertels on quantum computing Tech talk 2030 contents 7 14 16 Benvinguts a València Monica Lam on open-source Starting and scaling a successful voice assistants tech business 3 Welcome 30 SME snapshot Koen De Bosschere UltraSoC: Smarter systems thanks to self-aware chips 4 Policy corner Rupert Baines The future of technology – looking into the crystal ball 33 Innovation Europe Sandro D’Elia M2DC: The future of modular microserver technology 6 News João Pita Costa, Ariel Oleksiak, Micha vor dem Berge and Mario Porrmann 14 HiPEAC voices 34 Innovation Europe ‘We are witnessing the creation of closed, proprietary TULIPP: High-performance image processing for linguistic webs’ embedded computers Monica Lam Philippe Millet, Diana Göhringer, Michael Grinberg, 16 HiPEAC voices Igor Tchouchenkov, Magnus Jahre, Magnus Peterson, ‘Do not think that SME status is the final game’ Ben Rodriguez, Flemming Christensen and Fabien Marty Alberto Sangiovanni Vincentelli 35 Innovation Europe 18 Technology 2030 Software for the big data era with E2Data Computing for the future? The way forward for Juan Fumero computing systems 36 Innovation Europe Marc Duranton, Madeleine Gray and Marcin Ostasz A RECIPE for HPC success 23 Technology 2030 William Fornaciari Tech talk 2030 37 Innovation Europe Solving heterogeneous challenges with the 24 Future compute special Heterogeneity Alliance
    [Show full text]
  • Fog Computing: a Platform for Internet of Things and Analytics
    Fog Computing: A Platform for Internet of Things and Analytics Flavio Bonomi, Rodolfo Milito, Preethi Natarajan and Jiang Zhu Abstract Internet of Things (IoT) brings more than an explosive proliferation of endpoints. It is disruptive in several ways. In this chapter we examine those disrup- tions, and propose a hierarchical distributed architecture that extends from the edge of the network to the core nicknamed Fog Computing. In particular, we pay attention to a new dimension that IoT adds to Big Data and Analytics: a massively distributed number of sources at the edge. 1 Introduction The “pay-as-you-go” Cloud Computing model is an efficient alternative to owning and managing private data centers (DCs) for customers facing Web applications and batch processing. Several factors contribute to the economy of scale of mega DCs: higher predictability of massive aggregation, which allows higher utilization with- out degrading performance; convenient location that takes advantage of inexpensive power; and lower OPEX achieved through the deployment of homogeneous compute, storage, and networking components. Cloud computing frees the enterprise and the end user from the specification of many details. This bliss becomes a problem for latency-sensitive applications, which require nodes in the vicinity to meet their delay requirements. An emerging wave of Internet deployments, most notably the Internet of Things (IoTs), requires mobility support and geo-distribution in addition to location awareness and low latency. We argue that a new platform is needed to meet these requirements; a platform we call Fog Computing [1]. We also claim that rather than cannibalizing Cloud Computing, F. Bonomi R.
    [Show full text]
  • A Dynamic Cloud Computing Platform for Ehealth Systems
    A Dynamic Cloud Computing Platform for eHealth Systems Mehdi Bahrami 1 and Mukesh Singhal 2 Cloud Lab University of California Merced, USA Email: 1 IEEE Senior Member, [email protected]; 2 IEEE Fellow, [email protected] Abstract— Cloud Computing technology offers new Application Programming Interface (API) could have some opportunities for outsourcing data, and outsourcing computation issue when the application transfer to a cloud computing system to individuals, start-up businesses, and corporations in health that needs to redefine or modify the security functions of the API care. Although cloud computing paradigm provides interesting, in order to use the cloud. Each cloud computing system offer and cost effective opportunities to the users, it is not mature, and own services to using the cloud introduces new obstacles to users. For instance, vendor lock-in issue that causes a healthcare system rely on a cloud Security Issue: Data security refers to accessibility of stored vendor infrastructure, and it does not allow the system to easily data to only authorized users, and network security refers to transit from one vendor to another. Cloud data privacy is another accessibility of transfer of data between two authorized users issue and data privacy could be violated due to outsourcing data through a network. Since cloud computing uses the Internet as to a cloud computing system, in particular for a healthcare system part of its infrastructure, stored data on a cloud is vulnerable to that archives and processes sensitive data. In this paper, we both a breach in data and network security. present a novel cloud computing platform based on a Service- Oriented cloud architecture.
    [Show full text]
  • In-Memory Computing Platform: Data Grid Deep Dive
    In-Memory Computing Platform: Data Grid Deep Dive Rachel Pedreschi Matt Sarrel Director of Solutions Architecture Director of Technical Marketing GridGain Systems GridGain Systems [email protected] [email protected] @rachelpedreschi @msarrel © 2016 GridGain Systems, Inc. GridGain Company Confidential Agenda • Introduction • In-Memory Computing • GridGain / Apache Ignite Overview • Survey Results • Data Grid Deep Dive • Customer Case Studies © 2016 GridGain Systems, Inc. Why In-Memory Now? Digital Transformation is Driving Companies Closer to Their Customers • Driving a need for real-time interactions Internet Traffic, Data, and Connected Devices Continue to Grow • Web-scale applications and massive datasets require in-memory computing to scale out and speed up to keep pace • The Internet of Things generates huge amounts of data which require real-time analysis for real world uses The Cost of RAM Continues to Fall • In-memory solutions are increasingly cost effective versus disk-based storage for many use cases © 2015 GridGain Systems, Inc. GridGain Company Confidential Why Now? Data Growth and Internet Scale Declining DRAM Cost Driving Demand Driving Attractive Economics Growth of Global Data 35. 26.3 17.5 ZettabytesData of 8.8 DRAM 0. Flash Disk 8 zettabytes in 2015 growing to 35 in 2020 Cost drops 30% every 12 months © 2016 GridGain Systems, Inc. The In-Memory Computing Technology Market Is Big — And Growing Rapidly IMC-Enabling Application Infrastructure ($M) © 2016 GridGain Systems, Inc. What is an In-Memory Computing Platform?
    [Show full text]
  • The FPGA As a Computing Platform
    X01_Introduction.qxp 3/15/2005 3:31 PM Page 1 CHAPTER 1 The FPGA as a Computing Platform As the cost per gate of FPGAs declines, embedded and high-performance sys- tems designers are being presented with new opportunities for creating accel- erated software applications using FPGA-based programmable hardware platforms. From a hardware perspective, these new platforms effectively bridge the gap between software programmable systems based on traditional microprocessors, and application-specific platforms based on custom hard- ware functions. From a software perspective, advances in design tools and methodology for FPGA-based platforms enable the rapid creation of hardware-accelerated algorithms. The opportunities presented by these programmable hardware plat- forms include creation of custom hardware functions by software engineers, later design freeze dates, simplified field updates, and the reduction or elimi- nation of custom chips from many categories of electronic products. Increas- ingly, systems designers are seeing the benefits of using FPGAs as the basis for applications that are traditionally in the domain of application-specific in- tegrated circuits (ASICs). As FPGAs have grown in logic capacity, their ability to host high-performance software algorithms and complete applications has grown correspondingly. In this chapter, we will present a brief overview of FPGAs and FPGA- based platforms and present the general philosophy behind using the C lan- guage for FPGA application development. Experienced FPGA users will find 1 X01_Introduction.qxp 3/15/2005 3:31 PM Page 2 2 The FPGA as a Computing Platform much of this information familiar, but nonetheless we hope you stay with us as we take the FPGA into new, perhaps unfamiliar territory: that of high-performance computing.
    [Show full text]
  • Computing Platforms Chapter 4
    Computing Platforms Chapter 4 COE 306: Introduction to Embedded Systems Dr. Abdulaziz Tabbakh Computer Engineering Department College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals [Adapted from slides of Dr. A. El-Maleh, COE 306, KFUPM] Next . Basic Computing Platforms The CPU bus Direct Memory Access (DMA) System Bus Configurations ARM Bus: AMBA 2.0 Memory Components Embedded Platforms Platform-Level Performance Computing Platforms COE 306– Introduction to Embedded System– KFUPM slide 2 Embedded Systems Overview Actuator Output Analog/Digital Sensor Input Analog/Digital CPU Memory Embedded Computer Computing Platforms COE 306– Introduction to Embedded System– KFUPM slide 3 Computing Platforms Computing platforms are created using microprocessors, I/O devices, and memory components A CPU bus is required to connect the CPU to other devices Software is required to implement an application Embedded system software is closely tied to the hardware Computing Platform: hardware and software Computing Platforms COE 306– Introduction to Embedded System– KFUPM slide 4 Computing Platform A typical computing platform includes several major hardware components: The CPU provides basic computational facilities. RAM is used for program and data storage. ROM holds the boot program and some permanent data. A DMA controller provides direct memory access capabilities. Timers are used by the operating system A high-speed bus, connected to the CPU bus through a bridge, allows fast devices to communicate efficiently with the rest of the system. A low-speed bus provides an inexpensive way to connect simpler devices and may be necessary for backward compatibility as well. Computing Platforms COE 306– Introduction to Embedded System– KFUPM slide 5 Platform Hardware Components Computer systems may have one or more bus Buses are classified by their overall performance: lows peed, high- speed.
    [Show full text]
  • Download from an Unknown Website Cannot Be Said to Be ‘Safe’ Just Because It Happens Not to Harbor a Virus
    A direct path to dependable software The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Jackson, Daniel. “A direct path to dependable software.” Commun. ACM 52.4 (2009): 78-88. As Published http://dx.doi.org/10.1145/1498765.1498787 Publisher Association for Computing Machinery Version Author's final manuscript Citable link http://hdl.handle.net/1721.1/51683 Terms of Use Attribution-Noncommercial-Share Alike 3.0 Unported Detailed Terms http://creativecommons.org/licenses/by-nc-sa/3.0/ A Direct Path To Dependable Software Daniel Jackson Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology What would it take to make software more dependable? Until now, most approaches have been indirect: some practices – processes, tools or techniques – are used that are believed to yield dependable software, and the argument for dependability rests on the extent to which the developers have adhered to them. This article argues instead that developers should produce direct evidence that the software satisfies its dependability claims. The potential advantages of this approach are greater credibility (since the ar- gument is not contingent on the effectiveness of the practices) and reduced cost (since development resources can be focused where they have the most impact). 1 Why We Need Better Evidence Is a system that never fails dependable? Not necessarily. A dependable system is one you can depend on – that is, in which you can place your reliance or trust. A rational person or organization only does this with evidence that the system’s benefits outweigh its risks.
    [Show full text]
  • Open Source Solution for Cloud Computing Platform Using Openstack
    See discussions, stats, and author profiles for this publication at: http://www.researchgate.net/publication/263581733 Open Source Solution for Cloud Computing Platform Using OpenStack CONFERENCE PAPER · MAY 2014 DOI: 10.13140/2.1.1695.9043 CITATIONS DOWNLOADS VIEWS 8 826 204 5 AUTHORS, INCLUDING: Rakesh Kumar Neha Gupta JECRC Foundation University of Adelaide 20 PUBLICATIONS 69 CITATIONS 8 PUBLICATIONS 36 CITATIONS SEE PROFILE SEE PROFILE Shilpi Charu Kanishk Jain Rajasthan Technical University JECRC Foundation 10 PUBLICATIONS 33 CITATIONS 2 PUBLICATIONS 14 CITATIONS SEE PROFILE SEE PROFILE Available from: Rakesh Kumar Retrieved on: 10 August 2015 Rakesh Kumar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.5, May- 2014, pg. 89-98 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320–088X IJCSMC, Vol. 3, Issue. 5, May 2014, pg.89 – 98 RESEARCH ARTICLE Open Source Solution for Cloud Computing Platform Using OpenStack Rakesh Kumar1, Neha Gupta2, Shilpi Charu3, Kanishk Jain4, Sunil Kumar Jangir5 1,2,3,4,5Department of Information Technology, JECRC, Jaipur, India 1 [email protected], 2 [email protected], 3 [email protected] 4 [email protected], 5 [email protected] Abstract— OpenStack is a massively scalable open source cloud operating system that is a global collaboration of developers and cloud computing technologists producing the ubiquitous open source cloud computing platform for public and private clouds. OpenStack provides series of interrelated projects delivering various components for a cloud infrastructure solution as well as controls large pools of storage, compute and networking resources throughout a datacenter that all managed through a dashboard(Horizon) that gives administrators control while empowering their users to provision resources through a web interface.
    [Show full text]
  • A Review on Software Testing Framework in Cloud Computing
    D.Anitha et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014, 7553-7562 A Review on Software Testing Framework in Cloud Computing D.Anitha1 and Dr.M.V.Srinath2 1 Research Scholar, Department Of Computer Science, STET Womens College Mannargudi. 2Director, Department of Computer Applications, STET Womens College, Mannargudi. Abstract— Cloud computing has emerged as a new developers. It is based on .NET or Java extended computing paradigm that impacts several different research with cloud services. fields, including software testing. In cloud computing, the user 3. Infrastructure as a Service (Iaas) - It delivers cloud can use high end services in form of software that resides on computing infrastructures, namely, servers, different server and can be accessed from all over the world. software, data-center space and network It not only changes the way of obtaining computing resources but also alters the way of managing and delivering computing requirements. services, technologies and solutions. Software testing reduces The growth of cloud based services is evident, but the need for hardware and software resources and offers a cloud still undergoes development and testing before flexible and efficient cloud platform. Testing in the cloud deploying. The development of cloud-based services platform is effectively supported by engineers based on new increases with the need for testing their applications. Cloud test models and criteria. Prioritization technique is introduced computing provides cost effective and flexible means via to provide better relationship between test cases. These test scalable computing power and diverse services. The cloud cases are clustered based on priority level.
    [Show full text]
  • Integrated Circuit Designer
    About Seeqc At Seeqc, we are developing the world’s first digital quantum computing platform. Our unique chips- scale quantum architecture delivers unparalleled scope for commercial scalability. We have partnered with world-class quantum algorithm teams, and visionary enterprise clients to build quantum computers that will herald a new era in computational power. You will join a team of experienced executives and scientists with a varied background in superconducting digital circuits and quantum technologies. We have established an international presence, headquarters in New York with facilities in London and Naples, creating a truly diverse and unique team atmosphere. You will work with our international teams and partners to build a unique quantum computing platform with integrated superconducting digital circuits, designed to provide solutions for the ground-breaking challenges faced by our customers; from new drug modelling and building longer-lasting battery technologies, to advanced machine learning. We are offering full-time positions with highly competitive salary and company benefits including equity options. Roles are based in New York, and our international presence means that there will be opportunities to travel. For more info about Seeqc, head to seeqc.com About your role You will work closely with our digital design, quantum design and fabrication teams to perform circuit design including simulation, optimization, layout, verification of superconductor digital and mixed signal circuits. You will take advantage of your proficiency with computer-aided design tools to develop innovative solutions for the novel computational challenges realised in our unique hybrid quantum-classical superconducting quantum processor architecture. You will exploit your experience with analog RF circuit design or high-speed digital circuit design to create advanced classical circuits that can take maximum advantage Seeqc’s unique integrated quantum-classical quantum processors.
    [Show full text]
  • Nutanix Xtreme Computing Platform
    Datasheet Nutanix Xtreme Computing Platform The Nutanix Xtreme Computing Platform is a 100% software-driven infrastructure solution that natively converges storage, compute and virtualization into a turnkey appliance that can be deployed in minutes to run any application out of the box. Datacenter capacity can be easily expanded one node at a time with no disruption, delivering linear and predictable scalability with pay-as-you-grow flexibility. Nutanix eliminates complexity and allows IT to drive better business outcomes. Nutanix is built with the same web-scale technologies and architectures that power leading Internet and cloud infrastructures, such as Google, Facebook, and Amazon – and runs any workload at any scale. The Xtreme Computing Platform brings together web-scale engineering with consumer-grade management to make infrastructure invisible and elevate IT teams so they can focus on what matters most – applications. At the heart of the Xtreme Computing Platform are two product families: Nutanix Acropolis and Nutanix Prism. Acropolis provides a distributed storage fabric delivering enterprise storage services, and an app mobility fabric that enables workloads to move freely between virtualization environments without penalty. Nutanix Prism, a comprehensive management solution for Acropolis, delivering unprecedented one-click simplicity to the IT infrastructure lifecycle. Unprecedented Flexibility Uncompromising Simplicity Acropolis delivers the industry’s first open platform for Prism incorporates consumer-grade design to simplify application-centric virtualization and mobility. IT professionals deployment, optimization and operations of advanced IT benefit from uncompromising flexibility of where to run their infrastructure. Prism provides one-click infrastructure applications, and can freely choose the best application management, one-click operational insights and one-click virtualization and provisioning technologies for their troubleshooting for both storage and compute.
    [Show full text]
  • Building a Trustworthy Computing Platform
    Building a Trustworthy Computing Platform Gabriel L. Somlo, Ph.D. <[email protected]> SEI, CERT Division Carnegie Mellon University Pittsburgh, PA 15213 ©2019 Carnegie Mellon University Building a Trustworthy Computing Platform Gabriel L. Somlo, Ph.D. [Distribution Statement A] Approved for public release and unlimited distribution. Copyright 2019 Carnegie Mellon University. All Rights Reserved. This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The view, opinions, and/or findings contained in this material are those of the author(s) and should not be construed as an official Government position, policy, or decision, unless designated by other documentation. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution.
    [Show full text]