Solution Brief: Creating a Secure Base in a Virtual World

Size: px
Start display at page:

Download "Solution Brief: Creating a Secure Base in a Virtual World"

Transcription

1 Soluton Bref: Creatng a Secure Base n a Vrtual World

2 Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved cost effectveness of ncreased server utlzaton. The savngs n rack space, hardware costs, power consumpton, and many other factors are drvng ths steadly ncreasng trend. However, ths boom n logcal servers has resulted n a substantal ncrease n the number of devces connected to the network, and each needs to be ndvdually confgured, patched, and secured. Fortunately, solutons from Shavlk Technologes provde the same secure operatng base and patch management for vrtual machnes as they do for ther physcal counterparts. The Realty of Vrtualzaton In the past few years, medum- to large-szed organzatons have mplemented at least some level of vrtualzaton. Ths trend, whch leverages a sngle physcal resource such as a server to functon as multple logcal servers, s growng at an explosve rate. Research frm IDC estmates that between 2006 and 2009, vrtualzaton wll grow at a compound annual growth rate of almost 50 percent. Vrtualzaton s quckly becomng a realty at most organzatons. Ths document s provded strctly as a gude. provded or expected. Ths rapd growth n vrtualzaton s drven by a number of factors. These nclude better utlzaton of dle or avalable processng power wthn servers, reduced rack space and power consumpton, less hardware acquston and mantenance costs, easer backup, mproved hgh avalablty and dsaster recovery, and centralzed software management. Vrtual Machnes - Real Exposure Whle there are many benefts to vrtualzaton, organzatons must take care to apply approprate securty safeguards. Vrtualzaton can actually ncrease the need for securty, and system and securty admnstrators need to plan for and mplement defenses accordngly. Because each vrtual machne has ts own network address and can be scanned, hacked, nfected, and compromsed just lke a dedcated physcal devce, applyng securty to each ndvdual vrtual machne s as crtcal as securng dedcated physcal devces. Pag e 2

3 Soluton Bref: Creatng a Secure Base n a Vrtual World Although vrtualzaton may cause the number of physcal devces n an organzaton to be reduced, the number of logcal machnes usually ncreases. It s not uncommon to experence an enormous ncrease n the number of logcal servers. Because vrtualzaton allows new servers to be added wthout the costs of deployng new hardware, there s a strong tendency to ncrease the number of logcal servers. Rapd adopton of vrtualzaton technology results n a sgnfcant ncrease n the total number of servers that must be securely confgured and patched. Wth the ncreased number of servers to safeguard, securty and IT admnstrators need to aggressvely and contnuously montor for new devces, servers, and servces. Pror to vrtualzaton when addng a new devce meant deployng new hardware, the addton of new servers and applcatons was naturally throttled due to budget, hardware acquston, rack space, and other tme consumng actvtes. These physcal constrants created a natural process for IT operatons and securty teams to be notfed when new servers were beng added. Vrtualzaton elmnates much of ths process and structure, and as a result new servers and applcatons can appear sgnfcantly faster and easer, oftentmes wthout the coordnaton of the securty team. New vrtual servers can appear wthout authorzaton at all. Securty admnstrators must be equpped wth tools to proactvely dscover new vrtual devces as soon as they appear. Ths document s provded strctly as a gude. provded or expected. Wth the addtonal number of vrtual devces, securty admnstrators must have robust and comprehensve ways of trackng and managng the securty confguraton and patch status of each and every vrtual system. Each one needs ndvdual attenton. For example, an unpatched vrtual machne can stll be exploted, even f the host system s patched and not vulnerable. A common mstake s for IT or securty admnstrators to assume that a well-protected host nsulates the vrtual systems runnng behnd t. That s not the case. A UNIX based host, or any host for that matter, that s up to date wth all securty patches, perfectly confgured and hardened wll not protect a vrtual Mcrosoft IIS server runnng underneath. Lkewse, vrtual machnes and applances potentally carry embedded vulnerabltes and requre specal consderaton for patchng and updates. To establsh an effectve securty baselne, each and every vrtual machne needs ndvdual attenton and management. Pag e 3

4 Soluton Bref: Creatng a Secure Base n a Vrtual World Shavlk Securty For Your Vrtual Machnes One of the myths surroundng vrtual machnes s that the low-level nfrastructure and nterfaces that connect them to the network and management systems are subtly dfferent, and prevent many systems and applcatons from workng wth them. For example, t s commonly (but wrongly) thought that patch management systems wll not effectvely work wth vrtual machnes. Fortunately ths s not the case. Whle t s true that the system hostng the vrtual machne acts as a proxy, t s not true that ths causes problems for patch management. Today s vrtual machne host mplementatons are so well done that the proxes are capable of handlng even low level system orented tasks such as system shut-downs, re-starts, reconfgures, and system updates. Patch management, as mplemented by Shavlk Technologes, works equally well wth vrtual machnes and ther physcal counterparts. Vrtual machnes have the same vsblty to Shavlk s patch and vulnerablty management products as do dedcated machnes. Exstng and new vrtual devces are dscovered n the same way as dedcated devces. They have the same rsks and vulnerabltes, and they are detected n the same manner. Lkewse, securty baselnes are determned and establshed n the same manner. Ths document s provded strctly as a gude. provded or expected. When t comes tme to apply securty updates to vrtual machnes, admnstrators treat them just lke dedcated physcal devces. Vrtual machnes requre the same patches as dedcated devces, and the patches are tested, receved, appled, rolled back f necessary, and managed n the same way. Addtonal Dvdends from Shavlk Not only are Shavlk products compatble wth vrtual machnes, organzatons usng them wll fnd addtonal benefts that are not avalable n other patch and vulnerablty management solutons. Pag e 4

5 Soluton Bref: Creatng a Secure Base n a Vrtual World Agentless Approach Easest Way to Patch Vrtual Machnes Shavlk patch management does not requre agents. Ths has partcular advantages for organzatons rollng out vrtualzaton because of the shear numbers of new vrtual devces. Not only can these new devces be protected by Shavlk, patch and vulnerablty management can be done easly, from a sngle console, n a matter of mnutes. Ths s a tremendous advantage over solutons that requre agents to be nstalled on each new vrtual machne. Deployng and mantanng hundreds or thousands of agents on vrtual machnes wthn large organzatons s a tme consumng, tedous, and expensve effort. An agentless approach s less expensve to acqure, easer to deploy and mantan, and provdes mmedate protecton. Wth Shavlk s agentless approach, organzatons can rapdly accelerate ther level of securty because they can begn assessment, remedaton and generatng useful reports wthn mnutes of a new vrtual machne gong actve. There s lttle to no mpact on the data center or staff. Ths s crtcal gven the nature of contnuous operatons n large data centers. All of these benefts of an agentless approach are magnfed n a vrtual machne envronment, not only because of the rapd growth of vrtual machnes, but because they are more dynamc n nature - comng and gong at a much qucker pace than physcal, dedcated servers. Ths document s provded strctly as a gude. provded or expected. Shavlk Only Vendor Patchng Offlne Vrtual Machnes The unque advantage of usng Shavlk solutons to secure vrtual machnes s the ablty to patch ALL vrtual machnes, both onlne and offlne. As md- to large-szed organzatons have dscovered, patchng offlne machnes can be a real headache. For varous reasons, most enterprses have a sgnfcant number of vrtual mages offlne at any gven tme. Patch management systems can t patch what they can t see, so anythng that s beng servced, or offlne for any reason does not get patched. Whle there are varous technques to deal wth ths and ease the pan, t s stll panful. Everyone wants to see a report that says for a partcular crtcal vulnerablty, 100% of the organzaton s applcable machnes have been patched. Closure for each patch s greatly desred, and no securty offcers want to report to upper management that 77% of the vulnerable machnes have been patched. Untl that report says 100%, a certan amount of anxety or even nausea remans as an awful pt n the stomach of those responsble. Pag e 5

6 Soluton Bref: Creatng a Secure Base n a Vrtual World Shavlk Technologes has developed a way to patch all vrtual machnes, even those that are offlne. Ths ensures that offlne vrtual mages can be n a constant state of readness to be deployed. Shavlk s the only vendor capable of dong ths, and t s a huge beneft to ther customers. For example, many enterprses ntentonally have a sgnfcant number of vrtual machnes offlne at gven perods. One such usage s to ncrease overall uptme and hgh avalablty. Vrtual machnes have made t much easer for organzatons to have redundant machnes for peak processng perods, or to be used durng mantenance, or for hot standby machnes n case of a server falure. However, t s tme consumng and dffcult operatonally to brng these offlne machnes onlne just for patch management. Shavlk customers have the beneft of beng able to perform full vulnerablty management, ncludng patchng, for all of ther vrtual machnes, even those that are offlne. IT and securty staff can quckly verfy and report that 100% of the organzaton s vulnerable machnes physcal, vrtual, and offlne -- have receved a specfc crtcal patch and are protected. Snce offlne machnes can reman offlne whle they are beng patched, another plus for Shavlk customers s mproved securty. Offlne machnes don t have to be on the network and thus at rsk to the very vulnerablty they are beng patched for. Ths document s provded strctly as a gude. provded or expected. Furthermore, ths feature allows the wndow of vulnerablty to be sgnfcantly reduced. For example, some crtcal patches should be appled mmedately, but requre a system reboot. For operatonal reasons t may be dffcult for an organzaton to shut down a server to apply the patch, so they reman operatng wth the vulnerablty untl they can address t. However, wth the ablty to utlze vrtual redundant servers protected by Shavlk, the organzaton can mmedately patch an offlne standby server, and brng t onlne as the producton server. Ths gves the organzaton near mmedate protecton from the vulnerablty wthout havng to dspend servce. The prmary server, can now also be safely patched whle offlne and not vulnerable to attack. Pag e 6

7 Soluton Bref: Creatng a Secure Base n a Vrtual World Summary Conclusons It s clear that vrtualzaton, although a relatvely new trend, s seeng explosve adopton rates. The benefts of vrtualzaton that are drvng ths strong trend are not lmted to just operatonal savngs, but wth the rght securty nfrastructure, nclude a number of securty dvdends as well. Whle t s true that mplementng vrtualzaton wthout proper securty actually ncreases an organzaton s vulnerabltes, t s also true that when properly safeguarded wth Shavlk s agentless solutons and ther unque ablty to secure offlne vrtual servers, an organzaton can experence an mproved level of securty. Shavlk s agentless approach, and unque capablty of patchng offlne vrtual servers and machnes gves organzatons several benefts, ncludng: Proactvely engagng n a contnuous and ongong process to provde vulnerablty and patch management for vrtual machnes. Quck and automatc dscovery of new vrtual machnes, even before they come onlne. Scannng of exstng and new vrtual machnes for vulnerabltes. Report shortcomngs and, f desred, automatcally remedate them. Patch vrtual machnes whle they are offlne, and not subject to attack Ths document s provded strctly as a gude. provded or expected. Allow organzatons to respond mmedately to crtcal vulnerabltes that requre rebootng. Shavlk s powerful technologes and features for securng vrtual machnes make t possble for organzatons to experence all of the above, and many more benefts. Beng able to acheve ths wthout deployng agents makes t possble from both a cost and IT resource perspectve, to effectvely and effcently respond to the sgnfcant ncrease n the total number of logcal servers and devces caused by the mplementaton and growth of vrtual machnes. The myth that vrtual machnes can t be adequately patched s just that a myth. Wth Shavlk not only can they be effcently patched and managed, vrtual machnes can experence greater securty and advantages than ther physcal counterparts. Pag e 7

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Oracle Database: 12c Administrator

Oracle Database: 12c Administrator Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

FIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS

FIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS OPERATING MANUAL EN FIBARO WALL PLUG FGBWHWPE-102/FGBWHWPF-102 CONTENTS #1: Descrpton and features 3 #2: Parng the accessory 4 #3: Reset 5 #4: Functonalty 6 v1.0 #5: W-F 8 #6: Confgurable parameters 9

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Energy-Efficient Workload Placement in Enterprise Datacenters

Energy-Efficient Workload Placement in Enterprise Datacenters COVER FEATURE CLOUD COMPUTING Energy-Effcent Workload Placement n Enterprse Datacenters Quan Zhang and Wesong Sh, Wayne State Unversty Power loss from an unnterruptble power supply can account for 15 percent

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Mellanox CloudX, Mirantis Fuel Solution Guide

Mellanox CloudX, Mirantis Fuel Solution Guide Mellanox CloudX, Mrants Fuel Soluton Gude Rev.0 www.mellanox.com NOTE: THIS HARDWARE, SOFTWARE OR TEST SUITE PRODUCT ( PRODUCT(S) ) AND ITS RELATED DOCUMENTATION ARE PROVIDED BY MELLANOX TECHNOLOGIES AS-IS

More information

Avaya T3 Telephones connected to Integral 5 Setting up and using conference bridge Appendix to user s guide

Avaya T3 Telephones connected to Integral 5 Setting up and using conference bridge Appendix to user s guide Avaya T3 Telephones connected to Integral 5 Settng up and usng conference brdge Appendx to user s gude Issue 1 Integral 5 Software Release 2.6 September 2009 Use conference room Use conference room Your

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Run-Time Operator State Spilling for Memory Intensive Long-Running Queries

Run-Time Operator State Spilling for Memory Intensive Long-Running Queries Run-Tme Operator State Spllng for Memory Intensve Long-Runnng Queres Bn Lu, Yal Zhu, and lke A. Rundenstener epartment of Computer Scence, Worcester Polytechnc Insttute Worcester, Massachusetts, USA {bnlu,

More information

Configure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer

Configure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer FlashPont Sotware Inc. eomega Pagng Sotware Qualty Sotware For The Fre Alarm Industry Descrpton eomega pagng sotware provdes a means o convertng prnter output rom a Smplex re alarm panel nto short messages.

More information

Wireless Temperature Monitoring Overview

Wireless Temperature Monitoring Overview Wreless Temperature Montorng Overvew Wreless Temperature Montorng and Alerts. Your Dashboard gves you advanced montorng, alerts (SMS or Emals), graphng and PDF reports from anywhere n the world. Product

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Resolving Ambiguity in Depth Extraction for Motion Capture using Genetic Algorithm

Resolving Ambiguity in Depth Extraction for Motion Capture using Genetic Algorithm Resolvng Ambguty n Depth Extracton for Moton Capture usng Genetc Algorthm Yn Yee Wa, Ch Kn Chow, Tong Lee Computer Vson and Image Processng Laboratory Dept. of Electronc Engneerng The Chnese Unversty of

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Security. Workplace Manager

Security. Workplace Manager User Gude Manageablty and Securty Workplace Manager Congratulatons on your purchase of an nnovatve product from Fujtsu. The latest nformaton about our products, tps, updates etc. can be found on the Internet

More information

Analysis of 3D Cracks in an Arbitrary Geometry with Weld Residual Stress

Analysis of 3D Cracks in an Arbitrary Geometry with Weld Residual Stress Analyss of 3D Cracks n an Arbtrary Geometry wth Weld Resdual Stress Greg Thorwald, Ph.D. Ted L. Anderson, Ph.D. Structural Relablty Technology, Boulder, CO Abstract Materals contanng flaws lke nclusons

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

TripS: Automated Multi-tiered Data Placement in a Geo-distributed Cloud Environment

TripS: Automated Multi-tiered Data Placement in a Geo-distributed Cloud Environment TrpS: Automated Mult-tered Data Placement n a Geo-dstrbuted Cloud Envronment Kwangsung Oh, Abhshek Chandra, and Jon Wessman Department of Computer Scence and Engneerng Unversty of Mnnesota Twn Ctes Mnneapols,

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Energy Aware Virtual Machine Migration Techniques for Cloud Environment

Energy Aware Virtual Machine Migration Techniques for Cloud Environment Energy Aware rtual Machne Mgraton Technques for Cloud Envronment Kamal Gupta Department of CSE MMU, Sadopur jay Katyar, PhD Department of CSE MMU, Mullana ABSTRACT Cloud Computng offers ndspensable nfrastructure

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

INSTALL AND REGISTER PASTEL EVOLUTION

INSTALL AND REGISTER PASTEL EVOLUTION INSTALL AND REGISTER PASTEL EVOLUTION LESSON 1 LEARNING OUTCOME The purpose of ths lesson s to successfully nstall and regster Pastel Evoluton. LEARNING OBJECTIVES On completon of ths lesson, you wll be

More information

An optimized workflow for coherent noise attenuation in time-lapse processing

An optimized workflow for coherent noise attenuation in time-lapse processing An optmzed workflow for coherent nose attenuaton n tme-lapse processng Adel Khall 1, Hennng Hoeber 1, Steve Campbell 2, Mark Ibram 2 and Dan Daves 2. 1 CGGVertas, 2 BP 75 th EAGE Conference & Exhbton ncorporatng

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

with Optic65 and Optic25 Cameras FOR OUTDOOR TRACKING ONLY unless used in conjunction with the Indoor Tracking Accessory.

with Optic65 and Optic25 Cameras FOR OUTDOOR TRACKING ONLY unless used in conjunction with the Indoor Tracking Accessory. wth Optc6 and Optc Cameras Quck Start Gude FOR OUTDOOR TRACKING ONLY unless used n conjuncton wth the Indoor Trackng Accessory. CONGRATULATIONS ON SCORING YOUR SOLOSHOT Our category-creatng lne of personal

More information

mquest Quickstart Version 11.0

mquest Quickstart Version 11.0 mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce

More information

VideoJet X10 SN Network Video Server. Installation and Operating Manual

VideoJet X10 SN Network Video Server. Installation and Operating Manual VdeoJet X10 SN Network Vdeo Server en Installaton and Operatng Manual VdeoJet X10 SN VdeoJet X10 SN Table of Contents en 3 Table of Contents 1 Preface 7 1.1 About ths Manual 7 1.2 Conventons n ths Manual

More information

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011 9/8/2 2 Outlne Appendx C: The Bascs of Logc Desgn TDT4255 Computer Desgn Case Study: TDT4255 Communcaton Module Lecture 2 Magnus Jahre 3 4 Dgtal Systems C.2: Gates, Truth Tables and Logc Equatons All sgnals

More information

If you miss a key. Chapter 6: Demand Paging Source:

If you miss a key. Chapter 6: Demand Paging Source: ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Source: http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor If you mss a key after yesterday

More information

User Manual SAPERION Rich Client 7.1

User Manual SAPERION Rich Client 7.1 User Manual SAPERION Rch Clent 7.1 Copyrght 2016 Lexmark. All rghts reserved. Lexmark s a trademark of Lexmark Internatonal, Inc., regstered n the U.S. and/or other countres. All other trademarks are the

More information

Codian MCU MCU 4200 Series

Codian MCU MCU 4200 Series Codan MCU MCU 4200 Seres Gettng started Codan MCU MCU 4200 Seres Gettng started Copyrght Codan 2008. All rghts reserved. Ths Gettng Started Gude may not be coped, photocoped, translated, reproduced, or

More information

kccvoip.com basic voip training NAT/PAT extract 2008

kccvoip.com basic voip training NAT/PAT extract 2008 kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of

More information

Parallelization of a Series of Extreme Learning Machine Algorithms Based on Spark

Parallelization of a Series of Extreme Learning Machine Algorithms Based on Spark Parallelzaton of a Seres of Extreme Machne Algorthms Based on Spark Tantan Lu, Zhy Fang, Chen Zhao, Yngmn Zhou College of Computer Scence and Technology Jln Unversty, JLU Changchun, Chna e-mal: lutt1992x@sna.com

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,

More information

Energy Saving Techniques in Ad hoc Networks

Energy Saving Techniques in Ad hoc Networks Energy Savng Technques n Ad hoc Networks 1 Energy Savng Technques n Ad hoc Networks R. Durga Bhavan 1, S. Nagaman 2 and V. Asha 3 1 Asst. Professor, Dept. of CSE, R. K. College of Engneerng, Vjayawada,

More information

#4 Inverted page table. The need for more bookkeeping. Inverted page table architecture. Today. Our Small Quiz

#4 Inverted page table. The need for more bookkeeping. Inverted page table architecture. Today. Our Small Quiz ADRIAN PERRIG & TORSTEN HOEFLER Networks and Operatng Systems (-6-) Chapter 6: Demand Pagng http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor () # Inverted table One system-wde table

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

COMPRESSORS. Compressed Air Management System. SIGMA AIR MANAGER 4.0 Key technology for Industrie 4.0 For compressor and blower stations

COMPRESSORS. Compressed Air Management System. SIGMA AIR MANAGER 4.0 Key technology for Industrie 4.0 For compressor and blower stations Compressed Ar Management System SIGMA AIR MANAGER 4.0 Key technology for Industre 4.0 For compressor and blower statons www.kaeser.com SIGMA AIR MANAGER 4.0 Compressed ar control technology 4.0 from KAESER

More information

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture Two-Stage Data Dstrbuton for Dstrbuted Survellance Vdeo Processng wth Hybrd Storage Archtecture Yangyang Gao, Hatao Zhang, Bngchang Tang, Yanpe Zhu, Huadong Ma Bejng Key Lab of Intellgent Telecomm. Software

More information

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations*

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations* Confguraton Management n Mult-Context Reconfgurable Systems for Smultaneous Performance and Power Optmzatons* Rafael Maestre, Mlagros Fernandez Departamento de Arqutectura de Computadores y Automátca Unversdad

More information

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers Avaable onlne at www.scencedrect.com Proceda Engneerng 23 (20) 780 785 Power Electroncs and Engneerng Applcaton, 20 Game Based Vrtual Bandwdth Allocaton for Vrtual Networks n Data Centers Cu-rong Wang,

More information

user journey: a series of steps (typically 4-12) which represent a scenario in which a user might interact with the thing you are designing.

user journey: a series of steps (typically 4-12) which represent a scenario in which a user might interact with the thing you are designing. Topc Dscovery user journey: a seres of steps (typcally 4-12) whch represent a scenaro n whch a user mght nteract wth the thng you are desgnng. Two (2) man uses: 1. demonstratng the way users currently

More information

Setup and Use. Version 3.7 2/1/2014

Setup and Use. Version 3.7 2/1/2014 Verson 3.7 2/1/2014 Setup and Use MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com Contents Text2Bd checklst 3 Preparng

More information

Sensor-aware Adaptive Pull-Push Query Processing for Sensor Networks

Sensor-aware Adaptive Pull-Push Query Processing for Sensor Networks Sensor-aware Adaptve Pull-Push Query Processng for Sensor Networks Raja Bose Unversty of Florda Ganesvlle, FL 326 U.S.A. rbose@cse.ufl.edu Abdelsalam Helal Unversty of Florda Ganesvlle, FL 326 U.S.A. helal@cse.ufl.edu

More information

Support for Wireless LAN Design

Support for Wireless LAN Design Assocaton for Informaton Systems AIS Electronc Lbrary (AISeL) AMCIS 2005 Proceedngs Amercas Conference on Informaton Systems (AMCIS) 2005 Support for Wreless LAN Desgn Abhjt Dutt Unversty of Wsconsn -

More information

CSE 237A: Final Project Report Object Tracking Willis Hoang & Shimona Carvalho November 27, 2006

CSE 237A: Final Project Report Object Tracking Willis Hoang & Shimona Carvalho November 27, 2006 CSE 237A: Fnal Project Report Object Trackng Wlls Hoang & Shmona Carvalho November 27, 2006 1 Project Descrpton For ths project, we plan to mplement an object trackng applcaton usng the ntegrated vdeo

More information

Mouse Biometric Authentication

Mouse Biometric Authentication Proceedngs of Student-Faculty Research Day, CSIS, Pace Unversty, May nd, 014 Mouse Bometrc Authentcaton Francsco Betances, Adam Pne, Gerald Thompson, Hedeh Zandkarm, and Vnne Monaco Sedenberg School of

More information

Towards High Fidelity Network Emulation

Towards High Fidelity Network Emulation Towards Hgh Fdelty Network Emulaton Lanje Cao, Xangyu Bu, Sona Fahmy, Syuan Cao Department of Computer Scence, Purdue nversty, West Lafayette, IN, SA E-mal: {cao62, xb, fahmy, cao208}@purdue.edu Abstract

More information

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET

More information

AVL. Mobile Data, AVL & Mapping. Track with Confidence

AVL. Mobile Data, AVL & Mapping. Track with Confidence Moble Data, & Mappng Track wth Confdence 3012 MDT MILEAGE REPORTING 5 GENERAL PURPOSE INPUTS CARD READER & PRINTER CAPABILITIES TEXT MESSAGING MOTOTRBO TM & NEXEDGE TM COMPATIBLE Desgned for Two-Way rado

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Compressed Air Management System. SIGMA AIR MANAGER 2 Key technology for Industry

Compressed Air Management System. SIGMA AIR MANAGER 2 Key technology for Industry Compressed Ar Management System SIGMA AIR MANAGER 2 Key technology for Industry 4.0 www.kaeser.com SIGMA AIR MANAGER 2 Compressed ar control technology 4.0 from KAESER Compressors - BSD 75 - BSD 75 - BSD

More information

An IPv6-Oriented IDS Framework and Solutions of Two Problems

An IPv6-Oriented IDS Framework and Solutions of Two Problems An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

Security Analysis of IMA Primary Processing System Based on DFTA

Security Analysis of IMA Primary Processing System Based on DFTA Internatonal Conference on Mechatroncs, Electronc, Industral and Control Engneerng (MEIC 2014) Analyss of IMA Based on DFTA Ygang Sun ygsun@cauc.edu.cn Hao L haol0508@163.com Zhen Zhao zhenzhao0523@gmal.com

More information

High Utility Video Surveillance System on Public Transport using WiMAX technology

High Utility Video Surveillance System on Public Transport using WiMAX technology Edth Cowan Unversty Research Onlne ECU Publcatons Pre. 2011 2010 Hgh Utlty Vdeo Survellance System on Publc Transport usng WMAX technology Iftekhar Ahmad Edth Cowan Unversty Daryoush Habb Edth Cowan Unversty

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

InfoTerminal Touch Installation Instructions

InfoTerminal Touch Installation Instructions Order no.: 2071 xx 1. Safety warnngs Electrcal equpment must be nstalled and ftted by qualfed electrcans only and n strct observance of the relevant accdent preventon regulatons. Cut out the crcut breaker

More information

A dynamic bandwidth allocator for virtual machines in a cloud environment

A dynamic bandwidth allocator for virtual machines in a cloud environment A dynamc bandwdth allocator for vrtual machnes n a cloud envronment Ahmed Amamou, Manel Bourguba, Kamel Haddadou, Guy Pujolle To cte ths verson: Ahmed Amamou, Manel Bourguba, Kamel Haddadou, Guy Pujolle.

More information

Decision Support for the Dynamic Reconfiguration of Machine Layout and Part Routing in Cellular Manufacturing

Decision Support for the Dynamic Reconfiguration of Machine Layout and Part Routing in Cellular Manufacturing Decson Support for the Dynamc Reconfguraton of Machne Layout and Part Routng n Cellular Manufacturng Hao W. Ln and Tomohro Murata Abstract A mathematcal based approach s presented to evaluate the dynamc

More information

ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Page Table Structures Page table structures Page table structures Problem: smple lnear table s too bg Problem:

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Cisco TelePresence MCU 4200 Series

Cisco TelePresence MCU 4200 Series Csco TelePresence MCU 4200 Seres Gettng started 61-0002-08 Contents General nformaton... 3 About the Csco TelePresence MCU 4200 Seres... 3 Package contents... 3 Port and LED locaton... 3 LED behavor...

More information

On the Fairness-Efficiency Tradeoff for Packet Processing with Multiple Resources

On the Fairness-Efficiency Tradeoff for Packet Processing with Multiple Resources On the Farness-Effcency Tradeoff for Packet Processng wth Multple Resources We Wang, Chen Feng, Baochun L, and Ben Lang Department of Electrcal and Computer Engneerng, Unversty of Toronto {wewang, cfeng,

More information

SAO: A Stream Index for Answering Linear Optimization Queries

SAO: A Stream Index for Answering Linear Optimization Queries SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

A Framework for Distributed Computation Over a Heterogeneous Beowulf Cluster.

A Framework for Distributed Computation Over a Heterogeneous Beowulf Cluster. A Framework for Dstrbuted Computaton Over a Heterogeneous Beowulf Cluster. Jared A. Heuschele Computer Scence Unversty of Wsconsn-Eau Clare heuschja@uwec.edu Andrew T. Phllps Computer Scence Unversty of

More information

High resolution 3D Tau-p transform by matching pursuit Weiping Cao* and Warren S. Ross, Shearwater GeoServices

High resolution 3D Tau-p transform by matching pursuit Weiping Cao* and Warren S. Ross, Shearwater GeoServices Hgh resoluton 3D Tau-p transform by matchng pursut Wepng Cao* and Warren S. Ross, Shearwater GeoServces Summary The 3D Tau-p transform s of vtal sgnfcance for processng sesmc data acqured wth modern wde

More information

General Description. Description

General Description. Description June 0 Sheet 0 Metal-Enclosed Swtchgear MVS Medum Voltage Load Interrupter Fusble Swtch General Descrpton.0- Motor Operated MVS Swtches Applcaton Eaton s Cutler-Hammer MVS Pow-R- Drve motor operator makes

More information

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013

Setup and Use. For events not using AuctionMaestro Pro. Version /7/2013 Verson 3.1.2 2/7/2013 Setup and Use For events not usng AuctonMaestro Pro MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com

More information

Motivation. EE 457 Unit 4. Throughput vs. Latency. Performance Depends on View Point?! Computer System Performance. An individual user wants to:

Motivation. EE 457 Unit 4. Throughput vs. Latency. Performance Depends on View Point?! Computer System Performance. An individual user wants to: 4.1 4.2 Motvaton EE 457 Unt 4 Computer System Performance An ndvdual user wants to: Mnmze sngle program executon tme A datacenter owner wants to: Maxmze number of Mnmze ( ) http://e-tellgentnternetmarketng.com/webste/frustrated-computer-user-2/

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Achieving class-based QoS for transactional workloads

Achieving class-based QoS for transactional workloads Achevng class-based QoS for transactonal workloads Banca Schroeder Mor Harchol-Balter Carnege Mellon Unversty Department of Computer Scence Pttsburgh, PA USA @cs.cmu.edu Arun Iyengar Erch

More information