A Java Middleware for High Performance Computing (HPC) and Internet of Things (Iot)

Total Page:16

File Type:pdf, Size:1020Kb

A Java Middleware for High Performance Computing (HPC) and Internet of Things (Iot) UNIVERSIDADE FEDERAL DE OURO PRETO A Java middleware for High Performance Computing (HPC) and Internet of Things (IoT) Leonardo de Souza Cimino Universidade Federal de Ouro Preto Orientador: Joubert de Castro Lima Disserta¸c~aosubmetida ao Instituto de Ci^encias Exatas e Biol´ogicasda Universidade Federal de Ouro Preto para obten¸c~aodo t´ıtulode Mestre em Ci^enciada Computa¸c~ao Ouro Preto, Setembro de 2017 C490j Cimino, Leonardo de Souza. A Java middleware for High Performance Computing (HPC) and Internet of Things (IoT) [manuscrito] / Leonardo de Souza Cimino. - 2017. 81f.: il.: color; grafs; tabs. Orientador: Prof. Dr. Joubert de Castro Lima. Dissertação (Mestrado) - Universidade Federal de Ouro Preto. Instituto de Ciências Exatas e Biológicas. Departamento de Computação. Programa de Pós- Graduação em Ciência da Computação. Área de Concentração: Ciência da Computação. 1. Internet . 2. Computação de alto desempenho. 3. Middleware. I. Lima, Joubert de Castro. II. Universidade Federal de Ouro Preto. III. Titulo. CDU: 004.738.5 Catalogação: www.sisbin.ufop.br A Java middleware for High Performance Computing (HPC) and Internet of Things (IoT) Leonardo de Souza Cimino Universidade Federal de Ouro Preto Orientador: Joubert de Castro Lima ii Um middleware Java para Computa¸c~aode Alta Performance (HPC) e Internet das Coisas (IoT) Resumo Middlewares est~aoem todo lugar e provavelmente permanecer~aoem todo lugar por muito tempo para ajudar a reduzir a complexidade no desenvolvimento de aplica¸c~oes. Existem aplica¸c~oesque necessitam da integra¸c~aoentre as tecnologias Internet das Coisas (IoT) e Computa¸c~aode Alto Desempenho (HPC), entretanto, n~aoexiste nenhuma al- ternativa de middleware que aborda os problemas de ambas ao mesmo tempo. Em rela¸c~aoa HPC, os middlewares apresentados n~aoabordam solu¸c~oespara servi¸cosde sensoriamento, atua¸c~aoe sensibilidade de contexto. Em rela¸c~aoa IoT, os middlewares apresentados n~aoabordam solu¸c~oespara simplificar processamento paralelo/distribu´ıdo de prop´ositogeral e servi¸cosde armazenamento. Para reduzir a lacuna entre as tecnolo- gias HPC e IoT, inicialmente apresentamos uma revis~aosobre a integra¸c~aoentre IoT e HPC. Posteriormente, descrevemos um middleware IoT/HPC chamado JavaC´a&L´a (JCL) com uma API capaz de programar diferentes categorias de dispositivos e que suporta tr^esmodelos de programa¸c~ao. JCL ´eum middleware j´aexistente e desen- volvido originalmente para HPC. Neste trabalho, realizamos diversas melhorias para torn´a-louma solu¸c~aoque suporta o desenvolvimento de aplica¸c~oesintegradas IoT/HPC. As principais contribui¸c~oesdeste trabalho s~ao:i) uma revis~aoda literatura e uma an´alise comparativa entre os principais middlewares IoT e HPC; ii) a defini¸c~aode uma lista de requisitos que um middleware IoT/HPC deve suportar baseado na literatura; iii) um middleware que atende a maioria dos requisitos apresentados anteriormente, atenunando a lacuna existente na literatura de middlewares. Os resultados mostraram que o JCL ´eescal´avel, possui instala¸c~aosimplificada, aborda a maioria dos requisitos IoT/HPC e iii torna simples o desenvolvimento de aplica¸c~oesIoT/HPC port´aveis e distribu´ıdaspara as plataformas Android e Java, sendo capaz de rodar em clusters compostos por dispositivos Java, Android e Arduino. iv A Java middleware for High Performance Computing (HPC) and Internet of Things (IoT) Abstract Middleware systems are everywhere and most likely will remain everywhere for a long time to help reduce the complexity of application development. There are real user-applications (UAs) that need the integration between Internet of Things (IoT) and High Performance Computing (HPC), however there is no middleware alternative that addresses issues of both IoT and HPC technologies at the same time. In terms of HPC, the presented middleware solutions did not address solutions for sensing, actuating and context awareness services. In terms of IoT, the presented middleware solutions did not address solutions to simplify general-purpose parallel/distributed processing and storage services. To reduce the gap between HPC and IoT technologies, we first present a review about IoT and HPC integration. After that, we describe an IoT/HPC middleware so- lution, called JavaC´a&L´a(JCL), with an API capable of programming different device categories and supporting three programming models. JCL is an already existing mid- dleware solution originally designed for HPC. In this work, we made many improvements to turn it a middleware that supports the development of IoT/HPC integrated applica- tions. The main contributions of this work are: i) a literature review and comparative analysis of the main IoT and HPC middleware solutions; ii) the definition of a list of requirements based on the literature that an integrated IoT/HPC middleware solution should support; iii) a middleware that attends most of the requirements that an inte- grated solution should have, attenuating the existing gap in the middleware literature. The results demonstrated that JCL scales well, has a simple deployment, addresses most of the fundamental IoT/HPC requirements and it is very simple to develop portable and v integrated IoT/HPC distributed applications for Android and Java platforms that run over clusters composed of Java, Android and Arduino devices. vi Declara¸c~ao Esta disserta¸c~ao´eresultado de meu pr´opriotrabalho, exceto onde refer^enciaexpl´ıcita´e feita ao trabalho de outros, e n~aofoi submetida para outra qualifica¸c~aonesta nem em outra universidade. Leonardo de Souza Cimino vii Agradecimentos Primeiramente a Deus por mais um objetivo alcan¸cado; Ao meu pai, minha m~aee meu irm~ao por estarem sempre presentes e me darem for¸casnos momentos dif´ıceis; A` minha namorada por ser meu porto seguro, por todo apoio e compreens~aodurante esse per´ıodo; Ao professor Joubert por todo conhecimento transmitido e pela dedica¸c~aoaplicada a este trabalho; A toda equipe do laborat´orioHPC por toda ajuda; A todos aqueles que me ajudaram de alguma forma durante essa trajet´oria. Contents List of Figures xi List of Tables xiii 1 Introduction 1 1.1 Goal . .3 1.1.1 Specific Goals . .3 1.2 Contributions and Results . .3 1.3 Work organization . .3 2 IoT and HPC integration: revision and perspectives 5 2.1 Abstract . .5 2.2 Introduction . .5 2.3 IoT/HPC middleware requirements . .7 2.3.1 Security and Privacy . .7 2.3.2 Context Awareness . .8 2.3.3 Different Programming Models . .9 2.3.4 Distributed Storage . .9 2.3.5 Heterogeneity . 10 2.3.6 Simple Deployment . 11 viii CONTENTS ix 2.3.7 Fault Tolerance . 11 2.3.8 General-purpose Computing . 12 2.3.9 Code Refactoring . 12 2.3.10 Task Scheduler . 13 2.3.11 Super-peer Support . 13 2.3.12 Collaborative Development . 14 2.3.13 Performance and Scalability . 14 2.3.14 Sensing Analytics . 15 2.4 IoT/HPC integration: discussion and perspectives . 15 2.4.1 IoT Middlewares . 15 2.4.2 CoT Middlewares . 17 2.4.3 HPC Middlewares . 19 2.4.4 Perspectives . 21 2.5 Conclusion . 22 3 A middleware solution for integrating and exploring IoT and HPC capabilities 24 3.1 Abstract . 24 3.2 Introduction . 25 3.3 Related Work . 27 3.4 JCL middleware proposal . 29 3.4.1 Simple Deployment . 30 3.4.2 Security and Privacy . 33 3.4.3 Heterogeneity . 34 3.4.4 Context Awareness . 36 x CONTENTS 3.4.5 Code Refactoring . 37 3.4.6 Processing and Storage Scheduling . 38 3.4.7 Different Programming Models . 39 3.4.8 Super-peer support . 42 3.4.9 Collaborative Development . 43 3.4.10 Distributed Storage . 44 3.4.11 Performance and Scalability . 46 3.4.12 General-purpose computing . 52 3.4.13 Comparative analysis . 52 3.4.14 Developing an IoT/HPC application in JCL . 54 3.5 Conclusion . 55 4 Conclusion 57 Bibliography 59 List of Figures 3.1 JCL Services . 31 3.2 JCL multi-computer deployment view . 31 3.3 JCL multi-computer deployment view . 32 3.4 JCL multi-computer deployment view . 33 3.5 Runtime to register an application, requiring code conversions - Java to Android . 35 3.6 Runtime to register an application, requiring code conversions - Android toJava..................................... 35 3.7 Business logic - Hello World . 37 3.8 Distribution logic - Hello World . 38 3.9 Distribution logic - Complex Hello World . 39 3.10 1 to 16 concurrent UA getSensingDataNow() calls . 41 3.11 1 to 250 concurrent UA getSensingDataNow() calls . 41 3.12 Logical network partition using JCL-Super-Peer components . 42 3.13 JCL-Super-Peer managing different number of JCL-Hosts . 43 3.14 Overhead when the number of JCL-Super-Peers increased . 43 3.15 Runtime to store sensing data when the number of sensors varied . 45 3.16 Runtime to store sensing data when the interval time varied . 45 3.17 Runtime to store sensing data when the number of devices increased . 46 xi xii LIST OF FIGURES 3.18 JCL-Host CPU usage to publish sensing data periodically from several sensors . 48 3.19 JCL-Host CPU usage to publish sensing data according to different intervals 48 3.20 Arduino memory usage to publish sensing data periodically from several sensors . 49 3.21 JCL-Host memory usage to publish sensing data periodically from several sensors . 49 3.22 JCL-Host memory consumption to publish sensing data according to dif- ferent intervals . 49 3.23 JCL-Host CPU usage versus Zanzito when sensors increased . 53 3.24 JCL-Host memory consumption versus Zanzito when sensors increased . 53 3.25 JCL-Host battery usage versus Zanzito when sensors increased . 54 3.26 High-level vision of the Moving Object Observer application . 55 3.27 Moving Object Observer IoT Application .
Recommended publications
  • Automatic Sandboxing of Unsafe Software Components in High Level Languages
    Master Thesis Automatic Sandboxing of Unsafe Software Components in High Level Languages Benjamin Lamowski Technische Universität Dresden Fakultät Informatik Institut für Systemarchitektur Professur Betriebssysteme Betreuender Hochschullehrer: Prof. Dr. rer. nat. Hermann Härtig Betreuender Mitarbeiter: Dr. Carsten Weinhold 3. Mai 2017 Aufgabenstellung Neue “sichere“ Programmiersprachen wie Go, Swift oder Rust wurden nicht nur für die normale Anwendungsentwicklung entworfen, sondern sie zielen auch auf eine hochper- formante Ausführung und Programmierung vergleichsweise systemnaher Funktionalität ab. Eine attraktive Eigenschaft beispielsweise von Rust ist das gegenüber C und C++ deutlich strengere Speicherverwaltungsmodell, bei dem bereits zur Kompilierzeit der Lebenszyklus und die Erreichbarkeit von Objekten sowie die Zuständigkeit für deren Allokation und Deallokation wohldefiniert sind. Ganze Klassen von Programmfehlern wie etwa Buffer Overflows oder Dereferenzierung ungültige Zeiger werden dadurch eliminiert und die Programme mithin sicherer und robuster. Aus diversen Gründen müssen Programme, die in sicheren Sprachen geschriebenen wurden, aber oftmals auf “unsicheren“ Legacy-Code zurückgreifen. So bietet etwa Rust über das “unsafe“-Sprachelement die Möglichkeit, Funktionen innerhalb von Bibliotheken aufzurufen, die in fehleranfälligem C geschrieben sind. Leider werden die vom Com- piler durchgesetzten Garantien der sicheren Sprache hinfällig, sobald im Code einer C-Bibliothek ein Speicherfehler auftritt. Ein Schreibzugriff etwa durch
    [Show full text]
  • A Microkernel API for Fine-Grained Decomposition
    A Microkernel API for Fine-Grained Decomposition Sebastian Reichelt Jan Stoess Frank Bellosa System Architecture Group, University of Karlsruhe, Germany freichelt,stoess,[email protected] ABSTRACT from the microkernel APIs in existence. The need, for in- Microkernel-based operating systems typically require spe- stance, to explicitly pass messages between servers, or the cial attention to issues that otherwise arise only in dis- need to set up threads and address spaces in every server for tributed systems. The resulting extra code degrades per- parallelism or protection require OS developers to adopt the formance and increases development effort, severely limiting mindset of a distributed-system programmer rather than to decomposition granularity. take advantage of their knowledge on traditional OS design. We present a new microkernel design that enables OS devel- Distributed-system paradigms, though well-understood and opers to decompose systems into very fine-grained servers. suited for physically (and, thus, coarsely) partitioned sys- We avoid the typical obstacles by defining servers as light- tems, present obstacles to the fine-grained decomposition weight, passive objects. We replace complex IPC mecha- required to exploit the benefits of microkernels: First, a nisms by a simple function-call approach, and our passive, lot of development effort must be spent into matching the module-like server model obviates the need to create threads OS structure to the architecture of the selected microkernel, in every server. Server code is compiled into small self- which also hinders porting existing code from monolithic sys- contained files, which can be loaded into the same address tems. Second, the more servers exist | a desired property space (for speed) or different address spaces (for safety).
    [Show full text]
  • A Practical UNIX Capability System
    A Practical UNIX Capability System Adam Langley <[email protected]> 22nd June 2005 ii Abstract This report seeks to document the development of a capability security system based on a Linux kernel and to follow through the implications of such a system. After defining terms, several other capability systems are discussed and found to be excellent, but to have too high a barrier to entry. This motivates the development of the above system. The capability system decomposes traditionally monolithic applications into a number of communicating actors, each of which is a separate process. Actors may only communicate using the capabilities given to them and so the impact of a vulnerability in a given actor can be reasoned about. This design pattern is demonstrated to be advantageous in terms of security, comprehensibility and mod- ularity and with an acceptable performance penality. From this, following through a few of the further avenues which present themselves is the two hours traffic of our stage. Acknowledgments I would like to thank my supervisor, Dr Kelly, for all the time he has put into cajoling and persuading me that the rest of the world might have a trick or two worth learning. Also, I’d like to thank Bryce Wilcox-O’Hearn for introducing me to capabilities many years ago. Contents 1 Introduction 1 2 Terms 3 2.1 POSIX ‘Capabilities’ . 3 2.2 Password Capabilities . 4 3 Motivations 7 3.1 Ambient Authority . 7 3.2 Confused Deputy . 8 3.3 Pervasive Testing . 8 3.4 Clear Auditing of Vulnerabilities . 9 3.5 Easy Configurability .
    [Show full text]
  • On the Construction of Reliable Device Drivers Leonid Ryzhyk
    On the Construction of Reliable Device Drivers Leonid Ryzhyk Ph.D. 2009 ii iii ‘I hereby declare that this submission is my own work and to the best of my knowledge it contains no materials previously pub- lished or written by another person, or substantial proportions of material which have been accepted for the award of any other degree or diploma at UNSW or any other educational institution, except where due acknowledgement is made in the thesis. Any contribution made to the research by others, with whom I have worked at UNSW or elsewhere, is explicitly acknowledged in the thesis. I also declare that the intellectual content of this the- sis is the product of my own work, except to the extent that as- sistance from others in the project’s design and conception or in style, presentation, and linguistic expression is acknowledged.’ Signed .................................. Date .................................. iv Abstract This dissertation is dedicated to the problem of device driver reliability. Software defects in device drivers constitute the biggest source of failure in operating systems, causing sig- nificant damage through downtime and data loss. Previous research on driver reliability has concentrated on detecting and mitigating defects in existing drivers using static analysis or runtime isolation. In contrast, this dissertation presents an approach to reducing the number of defects through an improved device driver architecture and development process. In analysing factors that contribute to driver complexity and induce errors, I show that a large proportion of errors are due to two key shortcomings in the device-driver architecture enforced by current operating systems: poorly-defined communication protocols between drivers and the operating system, which confuse developers and lead to protocol violations, and a multithreaded model of computation, which leads to numerous race conditions and deadlocks.
    [Show full text]
  • High Performance with Distributed Caching
    High Performance with Distributed Caching Key Requirements For Choosing The Right Solution High Performance with Distributed Caching: Key Requirements for Choosing the Right Solution Table of Contents Executive summary 3 Companies are choosing Couchbase for their caching layer, and much more 3 Memory-first 4 Persistence 4 Elastic scalability 4 Replication 5 More than caching 5 About this guide 5 Memcached and Oracle Coherence – two popular caching solutions 6 Oracle Coherence 6 Memcached 6 Why cache? Better performance, lower costs 6 Common caching use cases 7 Key requirements for an effective distributed caching solution 8 Problems with Oracle Coherence: cost, complexity, capabilities 8 Memcached: A simple, powerful open source cache 10 Lack of enterprise support, built-in management, and advanced features 10 Couchbase Server as a high-performance distributed cache 10 General-purpose NoSQL database with Memcached roots 10 Meets key requirements for distributed caching 11 Develop with agility 11 Perform at any scale 11 Manage with ease 12 Benchmarks: Couchbase performance under caching workloads 12 Simple migration from Oracle Coherence or Memcached to Couchbase 13 Drop-in replacement for Memcached: No code changes required 14 Migrating from Oracle Coherence to Couchbase Server 14 Beyond caching: Simplify IT infrastructure, reduce costs with Couchbase 14 About Couchbase 14 Caching has become Executive Summary a de facto technology to boost application For many web, mobile, and Internet of Things (IoT) applications that run in clustered performance as well or cloud environments, distributed caching is a key requirement, for reasons of both as reduce costs. performance and cost. By caching frequently accessed data in memory – rather than making round trips to the backend database – applications can deliver highly responsive experiences that today’s users expect.
    [Show full text]
  • Concurrent and Distributed Cloudsim Simulations
    Concurrent and Distributed CloudSim Simulations Pradeeban Kathiravelu Luis Veiga INESC-ID Lisboa INESC-ID Lisboa Instituto Superior Tecnico,´ Universidade de Lisboa Instituto Superior Tecnico,´ Universidade de Lisboa Lisbon, Portugal Lisbon, Portugal Email: [email protected] Email: [email protected] Abstract—Cloud Computing researches involve a tremendous CloudSim was further developed as a cloud simulator on its amount of entities such as users, applications, and virtual ma- own. Due to its modular architecture which facilitates cus- chines. Due to the limited access and often variable availabil- tomizations, it is extended into different simulation tools such ity of such resources, researchers have their prototypes tested as CloudAnalyst [15] and NetworkCloudSim [16]. Developed against the simulation environments, opposed to the real cloud in Java, CloudSim is portable. CloudSim can be easily modified environments. Existing cloud simulation environments such as by extending the classes, with a few changes to the CloudSim CloudSim and EmuSim are executed sequentially, where a more advanced cloud simulation tool could be created extending them, core. Its source code is open and maintained. Hence, CloudSim leveraging the latest technologies as well as the availability of was picked as the core module to build the distributed simulator. multi-core computers and the clusters in the research laboratories. In the remaining of the paper, we will discuss the pre- This research seeks to develop Cloud2Sim, a concurrent and liminary background information on CloudSim in section II. distributed cloud simulator, extending CloudSim while exploiting the features provided by Hazelcast, Infinispan and Hibernate Section III discusses design and implementation of Cloud2Sim, Search to distribute the storage and execution of the simulation.
    [Show full text]
  • An Analysis of Network-Partitioning Failures in Cloud Systems
    An Analysis of Network-Partitioning Failures in Cloud Systems Ahmed Alquraan, Hatem Takruri, Mohammed Alfatafta, and Samer Al-Kiswany, University of Waterloo https://www.usenix.org/conference/osdi18/presentation/alquraan This paper is included in the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’18). October 8–10, 2018 • Carlsbad, CA, USA ISBN 978-1-939133-08-3 Open access to the Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation is sponsored by USENIX. An Analysis of Network-Partitioning Failures in Cloud Systems Ahmed Alquraan, Hatem Takruri, Mohammed Alfatafta, Samer Al-Kiswany University of Waterloo, Canada Abstract production networks, network-partitioning faults occur We present a comprehensive study of 136 system as frequently as once a week and take from tens of failures attributed to network-partitioning faults from minutes to hours to repair. 25 widely used distributed systems. We found that the Given that network-partitioning fault tolerance is a majority of the failures led to catastrophic effects, such well-studied problem [13, 14, 17, 20], this raises as data loss, reappearance of deleted data, broken locks, questions about how these faults sill lead to system and system crashes. The majority of the failures can failures. What is the impact of these failures? What are easily manifest once a network partition occurs: They the characteristics of the sequence of events that lead to require little to no client input, can be triggered by a system failure? What are the characteristics of the isolating a single node, and are deterministic. However, network-partitioning faults? And, foremost, how can we the number of test cases that one must consider is improve system resilience to these faults? To help answer these questions, we conducted a extremely large.
    [Show full text]
  • Executive Summary
    Mobile Commerce Security: Legal & Technological Perspectives Michael Triguboff Table of Contents EXECUTIVE SUMMARY 4 INTRODUCTION 7 The Need for Security 11 PART I TECHNOLOGY 12 Client-Side Vulnerabilities 12 Browser Software 13 Java Applets 14 ActiveX controls 16 JavaScript 18 Plug-Ins and Graphic Files 18 Push technology 18 Web Server Security 19 Front-end 20 Firewalls 22 Back-end Database vulnerabilities 23 Server- Side Middleware 24 Operating System Problems 25 Hardened versions of Operating Systems 36 Distributed systems 37 Software Testing 38 Mobile Commerce Issues 43 Device Properties 43 Wireless Communication 45 Wireless Communication Protocols 47 Ad Hoc Networks 49 Ad Hoc Networks and Key Management 51 Network Protection in Ad Hoc Networks 54 Location Dependent Information and Mobile Computing 55 Mobile Agents 56 Protecting the Host from the Mobile Agent 59 Safe Code Interpretation 61 Digital Signatures 63 Proof Carrying Code 63 Path Histories 64 Software-Based Fault Isolation [“Sandboxing”] 64 Protecting the Agent From the Host and Other Agents 64 Secure Control of Remote Agents 65 Read-Only/Append-Only 65 Partial Results Encapsulation 66 Code Obfuscation 67 Computing with Encrypted Functions 67 Environmental Key Generation 68 Execution Tracing 68 Itinerary Recording 69 Security Through Shared Secrets and Interlocking 69 Other Approaches 69 Attacks Based on Device Limitations 71 2 Prevention, Detection and Reaction 71 Intrusion Detection 72 Intrusion Detection and Mobile Agents 75 Part I Conclusion 76 PART 11 THE LEGAL PERSPECTIVE 80 The Debate: A Confluence of Two Streams 81 Uniform Electronic Transactions Act 85 Article 2B of the Uniform Commercial Code 85 The Electronic Signatures in Global and National Commerce Act [“E-Sign Act”] 88 Jurisdiction Selection 90 Reaction- Criminal Law 96 Convention on Cyber-Crime 97 Evidentiary or Procedural Law 99 Practical Considerations 100 Part II Conclusion 101 APPENDIX 103 Digital Millennium Copyright Act 103 BIBLIOGRAPHY 107 3 EXECUTIVE SUMMARY The objectives of this project are twofold.
    [Show full text]
  • Open Ongtang-Phd-Dissertation.Pdf
    The Pennsylvania State University The Graduate School SECURING MOBILE PHONES IN THE EVOLVING MOBILE ECOSYSTEM A Dissertation in Computer Science and Engineering by Machigar Ongtang © 2010 Machigar Ongtang Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2010 The dissertation of Machigar Ongtang was reviewed and approved∗ by the following: Patrick D. McDaniel Associate Professor of Computer Science and Engineering Dissertation Advisor, Chair of Committee Thomas F. La Porta Distinguished Professor of Computer Science and Engineering Trent Jaeger Associate Professor of Computer Science and Engineering Ling Rothrock Associate Professor of Industrial and Manufacturing Engineering Raj Acharya Professor of Computer Science and Engineering Department Head ∗Signatures are on file in the Graduate School. Abstract The revolution of mobile phone industry has been altering our life and business practices over the past few decades. Driven by user demands and technological advancement, we now experience rich mobile phone applications and sophisticated cellular services ranging from mobile payment, stock trading, to social networking, vehicle tracking to in-car control. As more players joining the community, this mobile phone environment has transformed into a complex network of interacting companies, known as mobile ecosystem. Unfortunately, this opening and converging mobile ecosystem has brought in more opportunities for more attacks on mobile phones, a key element of the system. This dissertation aims to achieve mobile phone security. We reveal two main chal- lenges that we need to overcome, namely developing a clear definition of secure phones, and building security infrastructure that imposes such definition on the phones. We also identify three key elements that contribute to the fidelity of mobile phones, namely, mobile phone platforms, mobile phone applications, and mobile content.
    [Show full text]
  • White Paper Using Hazelcast with Microservices
    WHITE PAPER Using Hazelcast with Microservices By Nick Pratt Vertex Integration June 2016 Using Hazelcast with Microservices Vertex Integration & Hazelcast WHITE PAPER Using Hazelcast with Microservices TABLE OF CONTENTS 1. Introduction 3 1.1 What is a Microservice 3 2. Our experience using Hazelcast with Microservices 3 2.1 Deployment 3 2.1.1 Embedded 4 2.2 Discovery 5 2.3 Solving Common Microservice Needs with Hazelcast 5 2.3.1 Multi-Language Microservices 5 2.3.2 Service Registry 5 2.4 Complexity and Isolation 6 2.4.1 Data Storage and Isolation 6 2.4.2 Security 7 2.4.3 Service Discovery 7 2.4.4 Inter-Process Communication 7 2.4.5 Event Store 8 2.4.6 Command Query Responsibility Segregation (CQRS) 8 3. Conclusion 8 TABLE OF FIGURES Figure 1 Microservices deployed as HZ Clients (recommended) 4 Figure 2 Microservices deployed with embedded HZ Server 4 Figure 3 Separate and isolated data store per Service 6 ABOUT THE AUTHOR Nick Pratt is Managing Partner at Vertex Integration LLC. Vertex Integration develops and maintains software solutions for data flow, data management, or automation challenges, either for a single user or an entire industry. The business world today demands that every business run at maximum efficiency.T hat means reducing errors, increasing response time, and improving the integrity of the underlying data. We can create a product that does all those things and that is specifically tailored to your needs. If your business needs a better way to collect, analyze, report, or share data to maximize your profitability, we can help.
    [Show full text]
  • Alfresco Enterprise on AWS: Reference Architecture October 2013
    Amazon Web Services – Alfresco Enterprise on AWS: Reference Architecture October 2013 Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Amazon Web Services – Alfresco Enterprise on AWS: Reference Architecture October 2013 Abstract Amazon Web Services (AWS) provides a complete set of services and tools for deploying business-critical enterprise workloads on its highly reliable and secure cloud infrastructure. Alfresco is an enterprise content management system (ECM) useful for document and case management, project collaboration, web content publishing and compliant records management. Few classes of business-critical applications touch more enterprise users than enterprise content management (ECM) and collaboration systems. This whitepaper provides IT infrastructure decision-makers and system administrators with specific technical guidance on how to configure, deploy, and run an Alfresco server cluster on AWS. We outline a reference architecture for an Alfresco deployment (version 4.1) that addresses common scalability, high availability, and security requirements, and we include an implementation guide and an AWS CloudFormation template that you can use to easily and quickly create a working Alfresco cluster in AWS. Introduction Enterprises need to grow and manage their global computing infrastructures rapidly and efficiently while simultaneously optimizing and managing capital costs and expenses. The computing and storage services from AWS meet this need by providing a global computing infrastructure as well as services that simplify managing infrastructure, storage, and databases. With the AWS infrastructure, companies can rapidly provision compute capacity or quickly and flexibly extend existing on-premises infrastructure into the cloud.
    [Show full text]
  • Sexy Technology Like Schema on the Fly
    Sexy Technology Like Schema On The Fly Sergei never change-overs any Botswana depolymerize speedfully, is Apollo acquitted and broadcast enough? Sometimes limiest Jarvis misdoes her sinfonia provokingly, but bespectacled Layton understudies belive or prognosticated hooly. Drearisome and mystifying Taylor prosper her enthrallment mechanizes or waver successfully. Id that much greater numbers in place to already instrumented with schema on technology the sexy like Anil has contain a technical contributor for various blogs such as IBM Watson. This method of keeping the live application up-to-date is called Hot Module. Monitor the dot database vulnerable to identify hot spots in future data. Worry throughput can be provisioned on the legislation without any downtime. Apache HBase Reference Guide. Convolutional neural networks we want to collected, for you to have to face development literature on the events on other technologies are generated automatically spins up and adults. Is OLAP Dead Senturus. As their name implies schemaless does not allege a schema. The Analyze Vacuum schema utility helps you automate the table. New scripts are hollow-deployed inside your already running Flink job as described in accept next section. Roles and schemas in part has their observation of characters in video. Amazon Timestream Is Finally Released Is inventory Worth Your. In making deal a large volume big data various databases technologies emerged adopting SQL like paradigmApache Hive is one cherish them. Using Infinispan as taking database replacement using Hibernate OGM you can. Find himself right schemas for your military and your thread on Schemaorg. Agents and Ambient Intelligence Achievements and Challenges. Gender Development Research for Sex Roles Historical.
    [Show full text]