Remote Task Submission and Publishing in BeesyCluster : Security and Efficiency of Web Service Interface

Size: px
Start display at page:

Download "Remote Task Submission and Publishing in BeesyCluster : Security and Efficiency of Web Service Interface"

Transcription

1 Remote Task Submission and Publishing in BeesyCluster : Security and Efficiency of Web Service Interface Paweł Czarnul, Michał Bajor, Marcin Fraczak, Anna Banaszczyk, Marcin Fiszer and Katarzyna Ramczykowska Faculty of Electronics, Telecommunications and Informatics Gdansk University of Technology, Poland pczarnul@eti.pg.gda.pl pczarnul Abstract. We present a new system BeesyCluster which can be seen as an easyto-use access portal to an expandable network of services deployed and published on clusters or PCs with virtual payments for the use of services. Administrators/users can attach their clusters/pcs available via SSH with a click of the button without any need for further configuration on the provider s machine. Further, users can publish console, queued applications or files from their accounts. Services run on the provider s account but access to the services is granted through BeesyCluster either via WWW or Web Services with proper authorization. Providers earn points for their services invoked by users which allows them to use services offered by others. We compare the set of features to other systems, especially grid systems, pointing out the proposed security concept, interfaces and API. We also benchmark the Web Service interface in BeesyCluster by measurement of latency and remote task submission times on large 32-bit 128-processor and 64-bit 256-processor clusters available in the ACC network, Gdansk, Poland. We compare the results to the performance of standard Web Services with HTTP Basic Authentication and HTTPS deployed on Tomcat/AXIS. 1 Introduction Publishing services for remote clients and remote task invocation are well known concepts in the literature. CORBA, RMI allow for the client-server interaction via remote calls ([1]) as do multi-tier applications with thin/thick clients and servers like J2EE or Tomcat. For Web Services ([2]) input/output arguments are wrapped in SOAP and carried over protocols like HTTP(S) or SMTP. While conceptually equivalent to COR- BA/RMI (remote procedure call), SOAP/HTTP enables interaction between parties via usually unblocked HTTP ports making Web Services more versatile and accessible than the other technologies. available on three servers at calculations were carried out at the Academic Computer Center, Gdansk, Poland work partially sponsored by the Polish National Grant KBN No. 4 T11C

2 2 Related Work vs. Our Contribution Controlled resource sharing between, usually large, universities and institutions, has become possible thanks to grid systems ([3]) examples of which are CrossGrid ([4]), CLUSTERIX ([5]) and EuroGrid ([6]). It must be assured that the client can neither overuse the remote resources allocated to them nor succeeds in an attempt to gain unauthorized access to other resources. Furthermore, secure data transmission, accounting and resource discovery must also be supported. Globus Toolkit ([7]) provides grid system developers with many of these functions allowing to focus on the higher level, the actual grid implementation. Legion allows users to spawn tasks remotely on a unified virtual metacomputer ([8]). H2O ([9]) is a component-level distributed system in which components can be deployed in containers, also by authorized external entities and made available to clients. While large grid systems allow the user to run tasks remotely, even via complex and easy-to-use interfaces like Migrating Desktop ([10]), still the configuration of remote sites, often difficult and time-consuming ([11] includes configuration of Worker Nodes for CrossGrid, [8] for Legion), is required. We see the above as an obstacle in building large, open systems of services with easily configurable, detachable remote sites which could very well be single PCs or clusters offering unique applications or services. We addressed these goals in a new system BeesyCluster, the continuation of our PVMWebCluster initiative ([12], [13]), which offers the following features: 1. ease of addition of a remote site (cluster/pc) to the system (requires only an account with SSH access with no additional configuration on the access node), 2. one-click service publishing from the provider s account on a cluster/pc (support for queuing systems like PBS, LSF), 3. one-click service (application, files etc.) rental capability from the provider s account(s) by any user of BeesyCluster, 4. accounting for the use of resources the provider earns points for offering services which can be spent on services offered by others, 5. access through both WWW and Web Services and discovery through BeesyCluster s own UDDI server (based on soapuddi). 3 New Concept BeesyCluster 3.1 Access Portal to HPC Facilities On the one hand, BeesyCluster can be thought of as an easy-to-use access portal to HPC facilities allowing the user to run/publish their own applications and edit files on the registered clusters/pcs via WWW (Figures 1 and 2) and Web Services with single sign-on for all clusters/pcs. It is the high-level middleware that executes commands on clusters/pcs on behalf of authorized users. BeesyCluster aims at making powerful ACC 1 clusters available via WWW and Web Services and allow inexperienced users to invoke published MPI/PVM applications with a mere click of the button (Figure 1). 1

3 Fig. 1: BeesyCluster s File Manager Fig. 2: Tasks (Queued) by the User and Tasks Rented from His/Her Account 3.2 Open, Distributed Network of Services On the other hand, BeesyCluster offers a truly open network of services offered by providers to clients (Figure 3) with the following features: Fig. 3: Client-Server Interaction in BeesyCluster COMPUTING MODEL : many providers, many clients, the client may also offer services as a provider; users can access and manage their accounts/files, run tasks through WWW or Web Services. SETTING UP AN ACCOUNT : a new user-provider sets up a BeesyCluster account by submitting logins/passwords of accounts available through SSH on the selected cluster/pc and is able to log in via BeesyCluster just after the administrator has granted access. It is only required that the account(s) are accessible via SSH. No other configuration is necessary which is possible thanks to the BeesyCluster security model explained in Paragraph 3.3. This gives BeesyCluster an advantage over the often complex process of deployment of new sites in grid systems ([11], [8]). The user can set up a BeesyCluster account without any cluster/pc accounts for use of free services published by others.

4 PUBLISHING SERVICES : The user can publish any of the applications (both run from the shell and to be submitted to the queue like LSF/PBS) or files from any of the registered accounts of any of the PCs/clusters registered to other users/groups (e.g. student groups) in BeesyCluster. The user-provider who grants access to a resource can allow right delegation to other users. Publishing a service does not give shell access and thus does not sacrifice security (Paragraph 3.3). RUNNING SERVICES : 1. The user has full access to any of the files/applications on their registered accounts on the registered PCs/clusters, can: access/edit files, run commands via an easy-to-use WWW interface (Figure 1) or Web Services (Figure 6). 2. For every published service, users see a link in the WWW interface. By clicking the user-client invokes the service which runs on the provider s account as may require a proper environment (libraries etc.). The Web Service interface is meant for more advanced users for integration of BeesyCluster services into their programs, the WWW interface for novice users. In the latter case, a sample scenario may involve clicking on a link corresponding to a climate modelling application, uploading files with input data (to a special directory for the client user on the provider account) and either running the task or specification of the queue, notification, exact number of processors etc. for LSF or PBS. Afterwards, the user can check the status of the task and upon completion view results in File Manager and download or copy them to their own accounts. BeesyCluster was designed as a J2EE application with the following components (Figure 4): KC (Cluster Commander) WWW front-end, TS (Team Support) module, AS (Authorization), RA (Run Anywhere for SSH communication with PCs/ clusters), PS (Payment Service for accounting of rented services each user has a virtual wallet to which points are added after other users executed paid services or subtracted after the user has used others services), Web Service front-end which are proper EJBs deployed as Web Services in JBoss/AXIS. Fig. 4: BeesyCluster s Architecture

5 3.3 Security Concept In Globus ([7]) and Legion ([8]) the authorization of the user is actually done by the resource provider/resources. In H2O proxy-objects authorize the user based on the policies given by the kernel owner or the user who loaded the pluglet ([9]). The BeesyCluster server itself acts as a centralized proxy which both authenticates and authorizes the user to invoke a given service. It is assumed the provider trusts BeesyCluster invokes services on their account only for the users they granted access to or for the account owner. Thus the attachment of a new cluster/pc and a user-provider account requires just database entries with the IP of the cluster and the account login/password. The commands are issued on the clusters via SSH by module RA (Figure 4). Transmission from the client to BeesyCluster uses HTTP or HTTPS which requires proper configuration ([14]) and the keystore file for the Web Service client. The authentication and authorization are implemented within BeesyCluster and require actions presented in Figure 5 for both the Web Service and WWW front-ends. For the Web Service access, after having obtained ids of login (handle logins) and signer modules (handle various encryption algorithms), the client must login with a password and obtain an authenticator which contains the id of the user, expiration date and is digitally signed by the system. The authenticator can be used to launch a command on a cluster the user has access to. Based on the authenticator, the user can obtain a ticket valid to use the given resource. Both the authenticator and the ticket are valid for a definite period of time thus it is safer to use them rather than login/password pairs. Web Service interface WWW Interface client bc/as bc/kcws BeesyCluster WWW lid = get login agent id () sid=get signer id () auth=login(login,password,lid,sid) run (auth,cluster,command) ticket=get ticket to resource(auth,res) run resource(ticket) run a command through the login, file manager, available resources web pages run a rented resource Fig. 5: Sequence to Invoke an Application in BeesyCluster via Web Services and WWW 3.4 Interfaces and API BeesyCluster offers an easy-to-use WWW interface which allows the user to: manage files/directories through an interface similar to Midnight Commander (Figure 1) including (de)compression, editing files, one-click task launch (interactively or queued on a

6 cluster), browsing available resources, publishing own resources with a single mouse click, viewing task results from queued tasks (own and rented tasks) Figure 2, delegating rights to other users and managing personal data. BeesyCluster allows FTP from the BeesyCluster server to any location where FTP is available. All file operations on the accounts registered in BeesyCluster are executed through a Java SSH library. For a rented task, a unique directory is created by BeesyCluster before running to which the task can print output (this can be assured by the programmer-provider). The task can read the directory name from an environment variable set by BeesyCluster. In fact, application could also be copied to this directory before execution in effect releasing the programmer from using the variable, just writing output to the directory where the application was spawned. The user-client can view the task results, copy them but does not see other directories nor has access to the shell on the provider s account. import p l. gda. pg. e t i. b e e s y c l u s t e r 2. ; 2 import as. i n t e r f a c e s. a u t h. ; import as. i n t e r f a c e s. s i g n. ;... 4 ASService s e r v i c e = new A S S e r v i c e L o c a t o r ( ) ; AS p o r t = s e r v i c e. getas ( ) ; t r y { / / f i r s t g e t l o g i n a g e n t and s i g n e r module i d s 6 L o g i n A g e n t D e s c r i p t i o n [ ] l a d = p o r t. l i s t L o g i n A g e n t s ( ) ; S i g n e r D e s c r i p t i o n [ ] sd= p o r t. l i s t S i g n e r s ( ) ; 8 S t r i n g [ ] a u t h = p o r t. l o g I n ( new S t r i n g [ ] { <l o g i n>, <password> }, l a d [ 0 ]. getid ( ), sd [ 0 ]. getid ( ) ) ; / / t r y t o l o g i n now 10 / / now t r y t o c a l l a method from t h e KCWS i n t e r f a c e KCWSService s e r v i c e 1 =new KCWSServiceLocator ( ) ;KCWS p o r t 1 = s e r v i c e 1. getkcws ( ) ; 12 System. o u t. p r i n t l n ( p o r t 1. runcommand ( auth, 2, a r g s [ 0 ] ) ) ; / / run t h e g i v e n command } catch ( IOException e ) {... Fig. 6: Client Code to Invoke a Command on a Cluster via BeesyCluster/Web Services The code for running a given command on the cluster via Web Services is shown in Figure 6. Apart from the account owner, the client user would only run one of resources previously made available to them (include predefined paths to the execution file, maximum number of processors on which the user can run the task etc.). 4 Performance Tests For benchmarking Web Services, we used the following configurations: 1. Standard Web Services, No Security. The client calls a service deployed as a JWS (Java Web Service) file on the Tomcat /AXIS 1.1 server. 2. Standard Web Services, Basic Authentication, HTTPS. Configuration as above. 3. Web Services in BeesyCluster. The user logs in and runs the command (Figures 5 and 6). We measure times for the latter call which validates the authenticator and invokes the command on the cluster via SSH. Case 2 indicates the HTTPS overhead when added to this scenario. BeesyCluster uses JBoss 3.2.3/AXIS 1.1. For the server, we used a Pentium4, 2GHz, 1GB RAM machine, for the client a Pentium4 2.8GHz, 1GB RAM laptop, both running Fedora 1. We have measured:

7 Web Service latency : measured by running the String getstring(string) method with a 3-char String given as input and returned as output. Figure 7 shows the latencies measured on the client and server on a single node, through LAN and WAN (Internet via ADSL) for all three configurations above. For BeesyCluster, we measured just the getstring method of the KCWS (Figure 6) interface. time required to run a task on the server : for configurations 1 and 2 the command is run on the Tomcat/AXIS server. For BeesyCluster it is run on a cluster account registered for the given user (actually on an access node for 128-processor galera and 256-processor holk at ACC, Gdansk, Poland). We run command cat <filename> which prints the contents of files of varying sizes to the standard output. Figure 8 presents the task run times (until calls return on the client side) on BeesyCluster and Tomcat/AXIS through LAN and WAN for both servers. For BeesyCluster, the login phase costs as much as the times of returning the string of the authenticator size (around 512 bytes). #$ ") #$ $ #$ & ") & $ & $ #$'!!( #$'!!( ") #$'!!( Fig. 7: Latency for 3-char String Used as Input/Output Web Service Parameter &'( #$! #$! Fig. 8: Task Submission/Run Times via Web Service on Local Node, LAN, WAN (Internet) It is important to note that BeesyCluster can serve client requests from many servers, in fact implementing clustering thanks to a distributed database with replication, used by all BeesyCluster servers. The client authenticator or ticket are passed in the request for both WWW and Web Service interfaces. We have three servers running at beesycluster[1,2].eti.pg.gda.pl. Analysis of latency of SOAP implementations, including AXIS, can be found in [15]. Our times for AXIS are slightly shorter (understandable given the faster hardware). We also present the latency for SOAP over HTTPS which is around 5 times larger than for HTTP (for small message sizes). We conclude that for latency, the BeesyCluster Web Services (KCWS.getString on JBoss/AXIS) are slightly slower than pure Tomcat/AXIS, both of which are faster than HTTPS on Tomcat/AXIS.

8 For remote task submission, BeesyCluster s call is slightly slower than pure Tomcat/AXIS but implements security and runs a command and fetches standard output from the remote cluster. 5 Conclusions and Future Work We have explained the main ideas and the security concept of BeesyCluster which offers an access portal to an expandable network of distributed clusters/pcs with easy resource publishing and interface. We have shown that the performance of the Web Service interface is comparable to that of pure Web Services deployed on Tomcat/AXIS. We are currently deploying the system for the ACC users as an access point for the HPC resources in Gdansk, Poland. We plan on testing the clustering features of BeesyCluster, especially under the large number of incoming requests. References 1. Buyya, R., ed.: High Performance Cluster Computing, Programming and Applications. Prentice Hall (1999) 2. Streicher, M.: Creating Web Services with AXIS: Apache s Latest SOAP Implementation Bootstraps Web Services. Linux Magazine (2002) 01.html. 3. Foster, I., Kesselman, C., Tuecke, S.: The Anatomy of the Grid: Enabling Scalable Virtual Organizations. International Journal of High Performance Computing Applications 15 (2001) CrossGrid: ( 5. R. Wyrzykowski, coordinator: (Clusterix) 6. EuroGrid: ( 7. Globus System: ( 8. The Legion Group: Legion 1.8. System Administrator Manual. (University of Virginia, VA, USA) pdf. 9. Kurzyniec, D., Wrzosek, T., Drzewiecki, D., Sunderam, V.: Towards self-organizing distributed computing frameworks: The h2o approach. Parallel Processing Letters 13 (2003) CrossGrid: (Migrating Desktop - User Guide, Portals and Roaming Access, WP3) wp3.crossgrid.org/cg3.1-d3.6-v2.1-psnc-mduserguide.doc. 11. Floros, V., Markou, C., Mastroyiannopoulos, N.: LCFGng Cluster Installation Guide Version 2.0 (LCG-2). (2004) xgrid/ cgfiles/lcfgng v2.0.pdf. 12. Czarnul, P.: Pvmwebcluster: Integration of pvm clusters using web services and corba. In: Proceedings of the 10th European PVM/MPI Users Group conference EuroPVM/MPI Volume LNCS 2840., Venice, Italy (2003) Czarnul, P.: Architecture and implementation of distributed data storage using web services, corba and pvm. In: Proceedings of the 5th International Conference on Parallel Processing and Applied Mathematics. Volume LNCS 3019., Czestochowa, Poland (2003) Gopalakrishnan, U., Ravi, R.K.: Web services security, Part I (2003) www-106. ibm.com/developerworks/webservices/library/ws-sec1.html. 15. Davis, D., Parashar, M.P.: Latency Performance of SOAP Implementations. In: 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID 02), Berlin, Germany (2002)

Grid Computing Initiative at UI: A Preliminary Result

Grid Computing Initiative at UI: A Preliminary Result Grid Computing Initiative at UI: A Preliminary Result Riri Fitri Sari, Kalamullah Ramli, Bagio Budiardjo e-mail: {riri, k.ramli, bbudi@ee.ui.ac.id} Center for Information and Communication Engineering

More information

Teaching High Performance Computing using BeesyCluster and Relevant Usage Statistics

Teaching High Performance Computing using BeesyCluster and Relevant Usage Statistics Procedia Computer Science Volume 29, 2014, Pages 1458 1467 ICCS 2014. 14th International Conference on Computational Science Teaching High Performance Computing using BeesyCluster and Relevant Usage Statistics

More information

A Resource Look up Strategy for Distributed Computing

A Resource Look up Strategy for Distributed Computing A Resource Look up Strategy for Distributed Computing F. AGOSTARO, A. GENCO, S. SORCE DINFO - Dipartimento di Ingegneria Informatica Università degli Studi di Palermo Viale delle Scienze, edificio 6 90128

More information

Grid Computing Fall 2005 Lecture 5: Grid Architecture and Globus. Gabrielle Allen

Grid Computing Fall 2005 Lecture 5: Grid Architecture and Globus. Gabrielle Allen Grid Computing 7700 Fall 2005 Lecture 5: Grid Architecture and Globus Gabrielle Allen allen@bit.csc.lsu.edu http://www.cct.lsu.edu/~gallen Concrete Example I have a source file Main.F on machine A, an

More information

Grid Service Provider: How to Improve Flexibility of Grid User Interfaces?

Grid Service Provider: How to Improve Flexibility of Grid User Interfaces? Grid Service Provider: How to Improve Flexibility of Grid User Interfaces? Maciej Bogdanski, Michal Kosiedowski, Cezary Mazurek, and Malgorzata Wolniewicz Poznan Supercomputing and Networking Center, ul.

More information

UNIT IV PROGRAMMING MODEL. Open source grid middleware packages - Globus Toolkit (GT4) Architecture, Configuration - Usage of Globus

UNIT IV PROGRAMMING MODEL. Open source grid middleware packages - Globus Toolkit (GT4) Architecture, Configuration - Usage of Globus UNIT IV PROGRAMMING MODEL Open source grid middleware packages - Globus Toolkit (GT4) Architecture, Configuration - Usage of Globus Globus: One of the most influential Grid middleware projects is the Globus

More information

UNICORE Globus: Interoperability of Grid Infrastructures

UNICORE Globus: Interoperability of Grid Infrastructures UNICORE : Interoperability of Grid Infrastructures Michael Rambadt Philipp Wieder Central Institute for Applied Mathematics (ZAM) Research Centre Juelich D 52425 Juelich, Germany Phone: +49 2461 612057

More information

JIMS Extensions for Resource Monitoring and Management of Solaris 10

JIMS Extensions for Resource Monitoring and Management of Solaris 10 1 ICCS 2006 (GSRM'06) JIMS Extensions for Resource Monitoring and Management of Solaris 10 JIMS Extensions for Resource Monitoring and Management of Solaris 10 Marcin Jarząb, Damian Wieczorek, Kazimierz

More information

Chapter 4:- Introduction to Grid and its Evolution. Prepared By:- NITIN PANDYA Assistant Professor SVBIT.

Chapter 4:- Introduction to Grid and its Evolution. Prepared By:- NITIN PANDYA Assistant Professor SVBIT. Chapter 4:- Introduction to Grid and its Evolution Prepared By:- Assistant Professor SVBIT. Overview Background: What is the Grid? Related technologies Grid applications Communities Grid Tools Case Studies

More information

Authentication, authorisation and accounting in distributed multimedia content delivery system.

Authentication, authorisation and accounting in distributed multimedia content delivery system. Authentication, authorisation and accounting in distributed multimedia content delivery system. Mirosław Czyrnek, Marcin Luboński, Cezary Mazurek Poznań Supercomputing and Networking Center (PSNC), ul.

More information

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme

A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme A Resource Discovery Algorithm in Mobile Grid Computing Based on IP-Paging Scheme Yue Zhang 1 and Yunxia Pei 2 1 Department of Math and Computer Science Center of Network, Henan Police College, Zhengzhou,

More information

New User-Guided and ckpt-based Checkpointing Libraries for Parallel MPI Applications,

New User-Guided and ckpt-based Checkpointing Libraries for Parallel MPI Applications, New User-Guided and ckpt-based Checkpointing Libraries for Parallel MPI Applications, Paweł Czarnul and Marcin Frączak Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology,

More information

NUSGRID a computational grid at NUS

NUSGRID a computational grid at NUS NUSGRID a computational grid at NUS Grace Foo (SVU/Academic Computing, Computer Centre) SVU is leading an initiative to set up a campus wide computational grid prototype at NUS. The initiative arose out

More information

Credentials Management for Authentication in a Grid-Based E-Learning Platform

Credentials Management for Authentication in a Grid-Based E-Learning Platform Credentials Management for Authentication in a Grid-Based E-Learning Platform Felicia Ionescu, Vlad Nae, Alexandru Gherega University Politehnica of Bucharest {fionescu, vnae, agherega}@tech.pub.ro Abstract

More information

Description of a Lightweight Bartering Grid Architecture

Description of a Lightweight Bartering Grid Architecture Description of a Lightweight Bartering Grid Architecture Cyril Briquet and Pierre-Arnoul de Marneffe Department of Electrical Engineering & Computer Science, University of Liège, Montefiore Institute,

More information

The Gateway Computational Web Portal: Developing Web Services for High Performance Computing

The Gateway Computational Web Portal: Developing Web Services for High Performance Computing The Gateway Computational Web Portal: Developing Web Services for High Performance Computing Marlon Pierce 1, Choonhan Youn 2, and Geoffrey Fox 3 1 Community Grids Laboratory, Indiana University, Bloomington

More information

presentation DAD Distributed Applications Development Cristian Toma

presentation DAD Distributed Applications Development Cristian Toma Lecture 12 S4 - Core Distributed Middleware Programming in JEE Distributed Development of Business Logic Layer presentation DAD Distributed Applications Development Cristian Toma D.I.C.E/D.E.I.C Department

More information

30 Nov Dec Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy

30 Nov Dec Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy Advanced School in High Performance and GRID Computing Concepts and Applications, ICTP, Trieste, Italy Why the Grid? Science is becoming increasingly digital and needs to deal with increasing amounts of

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

VSP18 Venafi Security Professional

VSP18 Venafi Security Professional VSP18 Venafi Security Professional 13 April 2018 2018 Venafi. All Rights Reserved. 1 VSP18 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for:

More information

Easy Access to Grid Infrastructures

Easy Access to Grid Infrastructures Easy Access to Grid Infrastructures Dr. Harald Kornmayer (NEC Laboratories Europe) On behalf of the g-eclipse consortium WP11 Grid Workshop Grenoble, France 09 th of December 2008 Background in astro particle

More information

Adaptation of Web service architecture in distributed embedded systems

Adaptation of Web service architecture in distributed embedded systems Adaptation of Web service architecture in distributed embedded systems Nikolay Kakanakov, Grisha Spasov Abstract: The paper discusses the possibility of adaptation of Web Services Architecture (WSA) in

More information

Reaching and Maintaining High Quality of Distributed J2EE Applications - BeesyCluster Case Study***

Reaching and Maintaining High Quality of Distributed J2EE Applications - BeesyCluster Case Study*** Reaching and Maintaining High Quality of Distributed J2EE Applications - BeesyCluster Case Study*** Pawet Czarnul Faculty of Electronics, Telecommunications and Informatics Gdansk University of Technology,

More information

Integration of Network Services Interface version 2 with the JUNOS Space SDK

Integration of Network Services Interface version 2 with the JUNOS Space SDK Integration of Network Services Interface version 2 with the JUNOS Space SDK Radosław Krzywania, Michał Balcerkiewicz, Bartosz Belter Poznan Supercomputing and Networking Center, ul. Z. Noskowskiego 12/14,

More information

Application Servers in E-Commerce Applications

Application Servers in E-Commerce Applications Application Servers in E-Commerce Applications Péter Mileff 1, Károly Nehéz 2 1 PhD student, 2 PhD, Department of Information Engineering, University of Miskolc Abstract Nowadays there is a growing demand

More information

SysAid Technical Presentation. Phone (Toll-Free US): Phone: +972 (3)

SysAid Technical Presentation.  Phone (Toll-Free US): Phone: +972 (3) SysAid Technical Presentation www.sysaid.com sales@sysaid.com Phone (Toll-Free US): 1-800-686-7047 Phone: +972 (3) 533-3675 SysAid Overview A Global ITSM Solution Provider Technology Built for You Customer-Driven

More information

THE VEGA PERSONAL GRID: A LIGHTWEIGHT GRID ARCHITECTURE

THE VEGA PERSONAL GRID: A LIGHTWEIGHT GRID ARCHITECTURE THE VEGA PERSONAL GRID: A LIGHTWEIGHT GRID ARCHITECTURE Wei Li, Zhiwei Xu, Bingchen Li, Yili Gong Institute of Computing Technology of Chinese Academy of Sciences Beijing China, 100080 {zxu, liwei, libingchen,

More information

GIS Deployment Guide. Introducing GIS

GIS Deployment Guide. Introducing GIS GIS Deployment Guide Introducing GIS 7/13/2018 Contents 1 Introducing GIS 1.1 About the Genesys Integration Server 1.2 GIS Architecture 1.3 System Requirements 1.4 GIS Use-Case Scenario 1.5 Licensing 1.6

More information

Using Resources of Multiple Grids with the Grid Service Provider. Micha?Kosiedowski

Using Resources of Multiple Grids with the Grid Service Provider. Micha?Kosiedowski Using Resources of Multiple Grids with the Grid Service Provider Micha?Kosiedowski Grid Service Provider The Grid Service Provider came as a result of research done within the PROGRESS project: Project

More information

APPLICATION ON DEMAND PORTAL USING J2EE TECHNOLOGIES

APPLICATION ON DEMAND PORTAL USING J2EE TECHNOLOGIES APPLICATION ON DEMAND PORTAL USING J2EE TECHNOLOGIES Ch. Bouras Research Academic Computer Technology Institute, & Computer Engineering and Informatics Dept., Univ. of Patras 61 Riga Feraiou Str, Patras,

More information

Advanced Service Design. vrealize Automation 6.2

Advanced Service Design. vrealize Automation 6.2 vrealize Automation 6.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to

More information

Enabling a Network Simulation Application on Grid Infrastructure

Enabling a Network Simulation Application on Grid Infrastructure Enabling a Network Simulation Application on Grid Infrastructure A. Menychtas 1, D. Apostolopoulos 1, D. Kyriazis 1, K. Christodoulopoulos 2, H. Avramopoulos 1 and T. Varvarigou 1 1 Department of Electrical

More information

S i m p l i f y i n g A d m i n i s t r a t i o n a n d M a n a g e m e n t P r o c e s s e s i n t h e P o l i s h N a t i o n a l C l u s t e r

S i m p l i f y i n g A d m i n i s t r a t i o n a n d M a n a g e m e n t P r o c e s s e s i n t h e P o l i s h N a t i o n a l C l u s t e r S i m p l i f y i n g A d m i n i s t r a t i o n a n d M a n a g e m e n t P r o c e s s e s i n t h e P o l i s h N a t i o n a l C l u s t e r Miroslaw Kupczyk, Norbert Meyer, Pawel Wolniewicz e-mail:

More information

Agent-Enabling Transformation of E-Commerce Portals with Web Services

Agent-Enabling Transformation of E-Commerce Portals with Web Services Agent-Enabling Transformation of E-Commerce Portals with Web Services Dr. David B. Ulmer CTO Sotheby s New York, NY 10021, USA Dr. Lixin Tao Professor Pace University Pleasantville, NY 10570, USA Abstract:

More information

By Ian Foster. Zhifeng Yun

By Ian Foster. Zhifeng Yun By Ian Foster Zhifeng Yun Outline Introduction Globus Architecture Globus Software Details Dev.Globus Community Summary Future Readings Introduction Globus Toolkit v4 is the work of many Globus Alliance

More information

System Requirements for ConSol CM Version Architectural Overview

System Requirements for ConSol CM Version Architectural Overview System Requirements for ConSol CM Version 6.11.1 Architectural Overview ConSol CM is built upon a Java EE web architecture, containing the following core components: JEE Application Server running the

More information

Chapter 2 System Models

Chapter 2 System Models CSF661 Distributed Systems 分散式系統 Chapter 2 System Models 吳俊興國立高雄大學資訊工程學系 Chapter 2 System Models 2.1 Introduction 2.2 Physical models 2.3 Architectural models 2.4 Fundamental models 2.5 Summary 2 A physical

More information

Monitoring System for Distributed Java Applications

Monitoring System for Distributed Java Applications Monitoring System for Distributed Java Applications W lodzimierz Funika 1, Marian Bubak 1,2, and Marcin Smȩtek 1 1 Institute of Computer Science, AGH, al. Mickiewicza 30, 30-059 Kraków, Poland 2 Academic

More information

COMPUTE CANADA GLOBUS PORTAL

COMPUTE CANADA GLOBUS PORTAL COMPUTE CANADA GLOBUS PORTAL Fast, user-friendly data transfer and sharing Jason Hlady University of Saskatchewan WestGrid / Compute Canada February 4, 2015 Why Globus? I need to easily, quickly, and reliably

More information

Oracle Identity Manager: Administration and Implementation

Oracle Identity Manager: Administration and Implementation Oracle University Contact Us: 1.800.529.0165 Oracle Identity Manager: Administration and Implementation Duration: 5 Days What you will learn The Oracle Identity Manager: Administration and Implementation

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information

A Compact Computing Environment For A Windows PC Cluster Towards Seamless Molecular Dynamics Simulations

A Compact Computing Environment For A Windows PC Cluster Towards Seamless Molecular Dynamics Simulations A Compact Computing Environment For A Windows PC Cluster Towards Seamless Molecular Dynamics Simulations Yuichi Tsujita Abstract A Windows PC cluster is focused for its high availabilities and fruitful

More information

DiPerF: automated DIstributed PERformance testing Framework

DiPerF: automated DIstributed PERformance testing Framework DiPerF: automated DIstributed PERformance testing Framework Ioan Raicu, Catalin Dumitrescu, Matei Ripeanu, Ian Foster Distributed Systems Laboratory Computer Science Department University of Chicago Introduction

More information

On the Creation of Distributed Simulation Web- Services in CD++

On the Creation of Distributed Simulation Web- Services in CD++ On the Creation of Distributed Simulation Web- Services in CD++ Rami Madhoun, Bo Feng, Gabriel Wainer, Abstract CD++ is a toolkit developed to execute discrete event simulations following the DEVS and

More information

Ricoh Managed File Transfer (MFT) User Guide

Ricoh Managed File Transfer (MFT) User Guide Ricoh Managed File Transfer (MFT) User Guide -- TABLE OF CONTENTS 1 ACCESSING THE SITE... 3 1.1. WHAT IS RICOH MFT... 3 1.2. SUPPORTED BROWSERS... 3 1.3. LOG IN... 3 1.4. NAVIGATION... 4 1.5. FORGOTTEN

More information

Grid Computing Middleware. Definitions & functions Middleware components Globus glite

Grid Computing Middleware. Definitions & functions Middleware components Globus glite Seminar Review 1 Topics Grid Computing Middleware Grid Resource Management Grid Computing Security Applications of SOA and Web Services Semantic Grid Grid & E-Science Grid Economics Cloud Computing 2 Grid

More information

Globus Toolkit 4 Execution Management. Alexandra Jimborean International School of Informatics Hagenberg, 2009

Globus Toolkit 4 Execution Management. Alexandra Jimborean International School of Informatics Hagenberg, 2009 Globus Toolkit 4 Execution Management Alexandra Jimborean International School of Informatics Hagenberg, 2009 2 Agenda of the day Introduction to Globus Toolkit and GRAM Zoom In WS GRAM Usage Guide Architecture

More information

Research on the Key Technologies of Geospatial Information Grid Service Workflow System

Research on the Key Technologies of Geospatial Information Grid Service Workflow System Research on the Key Technologies of Geospatial Information Grid Service Workflow System Lin Wan *, Zhong Xie, Liang Wu Faculty of Information Engineering China University of Geosciences Wuhan, China *

More information

A VO-friendly, Community-based Authorization Framework

A VO-friendly, Community-based Authorization Framework A VO-friendly, Community-based Authorization Framework Part 1: Use Cases, Requirements, and Approach Ray Plante and Bruce Loftis NCSA Version 0.1 (February 11, 2005) Abstract The era of massive surveys

More information

PRODUCT MANUAL. idashboards Reports Admin Manual. Version 9.1

PRODUCT MANUAL. idashboards Reports Admin Manual. Version 9.1 PRODUCT MANUAL idashboards Reports Admin Manual Version 9.1 idashboards Reports Admin Manual Version 9.1 No part of the computer software or this document may be reproduced or transmitted in any form or

More information

IST GridLab - A Grid Application Toolkit and Testbed. Result Evaluation. Jason Maassen, Rob V. van Nieuwpoort, Andre Merzky, Thilo Kielmann

IST GridLab - A Grid Application Toolkit and Testbed. Result Evaluation. Jason Maassen, Rob V. van Nieuwpoort, Andre Merzky, Thilo Kielmann GridLab - A Grid Application Toolkit and Testbed Result Evaluation Author(s): Document Filename: Work package: Partner(s): Lead Partner: Config ID: Document classification: Jason Maassen, Rob V. van Nieuwpoort,

More information

Distributed Systems. Bina Ramamurthy. 6/13/2005 B.Ramamurthy 1

Distributed Systems. Bina Ramamurthy. 6/13/2005 B.Ramamurthy 1 Distributed Systems Bina Ramamurthy 6/13/2005 B.Ramamurthy 1 Introduction Distributed system is the one in which hardware and software components at networked computers communicate and coordinate their

More information

Computer and Automation Research Institute Hungarian Academy of Sciences. Jini and the Grid. P. Kacsuk

Computer and Automation Research Institute Hungarian Academy of Sciences. Jini and the Grid. P. Kacsuk Computer and Automation Research Institute Hungarian Academy of Sciences Jini and the Grid P. Kacsuk Laboratory of Parallel and Distributed Systems MTA SZTAKI Research Institute kacsuk@sztaki.hu www.lpds.sztaki.hu

More information

Research and Design Application Platform of Service Grid Based on WSRF

Research and Design Application Platform of Service Grid Based on WSRF DOI: 10.7763/IPEDR. 2012. V49. 27 Research and Design Application Platform of Service Grid Based on WSRF Jianmei Ge a, Shying Zhang a College of Computer Science and Technology, Beihua University, No.1

More information

Distributed Invocation of Composite Web Services

Distributed Invocation of Composite Web Services Distributed Invocation of Composite Web Services Chang-Sup Park 1 and Soyeon Park 2 1. Department of Internet Information Engineering, University of Suwon, Korea park@suwon.ac.kr 2. Department of Computer

More information

Scheduling in SAS 9.4, Second Edition

Scheduling in SAS 9.4, Second Edition Scheduling in SAS 9.4, Second Edition SAS Documentation September 5, 2017 The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2016. Scheduling in SAS 9.4, Second Edition.

More information

A Capabilities Based Communication Model for High-Performance Distributed Applications: The Open HPC++ Approach

A Capabilities Based Communication Model for High-Performance Distributed Applications: The Open HPC++ Approach A Capabilities Based Communication Model for High-Performance Distributed Applications: The Open HPC++ Approach Shridhar Diwan, Dennis Gannon Department of Computer Science Indiana University Bloomington,

More information

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE Most application performance problems surface during peak loads. Often times, these problems are time and resource intensive,

More information

Delivers cost savings, high definition display, and supercharged sharing

Delivers cost savings, high definition display, and supercharged sharing TM OpenText TM Exceed TurboX Delivers cost savings, high definition display, and supercharged sharing OpenText Exceed TurboX is an advanced solution for desktop virtualization and remote access to enterprise

More information

Grid Architectural Models

Grid Architectural Models Grid Architectural Models Computational Grids - A computational Grid aggregates the processing power from a distributed collection of systems - This type of Grid is primarily composed of low powered computers

More information

(9A05803) WEB SERVICES (ELECTIVE - III)

(9A05803) WEB SERVICES (ELECTIVE - III) 1 UNIT III (9A05803) WEB SERVICES (ELECTIVE - III) Web services Architecture: web services architecture and its characteristics, core building blocks of web services, standards and technologies available

More information

A model, design, and implementation of an efficient multithreaded workflow execution engine with data streaming, caching, and storage constraints

A model, design, and implementation of an efficient multithreaded workflow execution engine with data streaming, caching, and storage constraints J Supercomput (2013) 63:919 945 DOI 10.1007/s11227-012-0837-z A model, design, and implementation of an efficient multithreaded workflow execution engine with data streaming, caching, and storage constraints

More information

SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide

SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software,

More information

Ubiquitous Access to Personalised Services

Ubiquitous Access to Personalised Services Ubiquitous Access to Personalised Services 1 Tore E. J{lSnvik, 2 Anne Marie Hartvigsen & 3 Do van Thanh 1. Unik - University of Oslo - Norway - tif: +4790199176 - torejoen@iji.uio.no 2. AgderUniversity

More information

Globalbrain Administration Guide. Version 5.4

Globalbrain Administration Guide. Version 5.4 Globalbrain Administration Guide Version 5.4 Copyright 2012 by Brainware, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud SaaSaMe Transport Workload Snapshot Export for Alibaba Cloud Contents About This Document... 3 Revision History... 3 Workload Snapshot Export for Alibaba Cloud... 4 Workload Snapshot Export Feature...

More information

Getting Started with Commercial Services

Getting Started with Commercial Services Getting Started with Commercial Services USER GUIDE For informational purposes only, not considered an advertisement. WELCOME TO M&T BANK S COMMERCIAL SERVICES M&T Bank s Commercial Services system provides

More information

X100 ARCHITECTURE REFERENCES:

X100 ARCHITECTURE REFERENCES: UNION SYSTEMS GLOBAL This guide is designed to provide you with an highlevel overview of some of the key points of the Oracle Fusion Middleware Forms Services architecture, a component of the Oracle Fusion

More information

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper

TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS. White Paper TECHNICAL WHITE PAPER DECEMBER 2017 VMWARE HORIZON CLOUD SERVICE ON MICROSOFT AZURE SECURITY CONSIDERATIONS White Paper Table of Contents Executive Summary... 3 Audience.... 3 Introduction.... 3 Architecture....

More information

Gridbus Portlets -- USER GUIDE -- GRIDBUS PORTLETS 1 1. GETTING STARTED 2 2. AUTHENTICATION 3 3. WORKING WITH PROJECTS 4

Gridbus Portlets -- USER GUIDE --  GRIDBUS PORTLETS 1 1. GETTING STARTED 2 2. AUTHENTICATION 3 3. WORKING WITH PROJECTS 4 Gridbus Portlets -- USER GUIDE -- www.gridbus.org/broker GRIDBUS PORTLETS 1 1. GETTING STARTED 2 1.1. PREREQUISITES: 2 1.2. INSTALLATION: 2 2. AUTHENTICATION 3 3. WORKING WITH PROJECTS 4 3.1. CREATING

More information

Asta Development. Product Overview and System Requirements Guide

Asta Development. Product Overview and System Requirements Guide Asta Development Product Overview and System Requirements Guide Asta Development plc Kingston House Goodsons Mews Wellington Street Thame Oxfordshire OX9 3BX United Kingdom Tel: +44 (0)1844 261700 Fax:

More information

Release Notes for Dominion KX III User Station Version 3.1 February 2019

Release Notes for Dominion KX III User Station Version 3.1 February 2019 Release Notes for Dominion KX III User Station Version 3.1 February 2019 Supported Dominion KX Models: DKX3-108, DKX3-116, DKX3-132, DKX3-216, DKX3-232 DKX3-416, DKX3-432, DKX3-464, DKX3-808, DKX3-832,

More information

Multi-tier architecture performance analysis. Papers covered

Multi-tier architecture performance analysis. Papers covered Multi-tier architecture performance analysis Papers covered Emmanuel Cecchet, Julie Marguerie, Willy Zwaenepoel: Performance and Scalability of EJB Applications. OOPSLA 02 Yan Liu, Alan Fekete, Ian Gorton:

More information

A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme

A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme A Resource Discovery Algorithm in Mobile Grid Computing based on IP-paging Scheme Yue Zhang, Yunxia Pei To cite this version: Yue Zhang, Yunxia Pei. A Resource Discovery Algorithm in Mobile Grid Computing

More information

Design of Distributed Data Mining Applications on the KNOWLEDGE GRID

Design of Distributed Data Mining Applications on the KNOWLEDGE GRID Design of Distributed Data Mining Applications on the KNOWLEDGE GRID Mario Cannataro ICAR-CNR cannataro@acm.org Domenico Talia DEIS University of Calabria talia@deis.unical.it Paolo Trunfio DEIS University

More information

From Parallel Virtual Machine to Virtual Parallel Machine: The Unibus System

From Parallel Virtual Machine to Virtual Parallel Machine: The Unibus System From Parallel Virtual Machine to Virtual Parallel Machine: The Unibus System Vaidy Sunderam Emory University, Atlanta, USA vss@emory.edu Credits and Acknowledgements Distributed Computing Laboratory, Emory

More information

SOA Software Policy Manager Agent v6.1 for tc Server Application Server Installation Guide

SOA Software Policy Manager Agent v6.1 for tc Server Application Server Installation Guide SOA Software Policy Manager Agent v6.1 for tc Server Application Server Installation Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software,

More information

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

VMware AirWatch Cloud Connector Guide ACC Installation and Integration VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

An Experience in Accessing Grid Computing from Mobile Device with GridLab Mobile Services

An Experience in Accessing Grid Computing from Mobile Device with GridLab Mobile Services An Experience in Accessing Grid Computing from Mobile Device with GridLab Mobile Services Riri Fitri Sari, Rene Paulus Department of Electrical Engineering, Faculty of Engineering University of Indonesia

More information

Design document for CSC/ECE 517 Fall 2002 Semester Project Security & Visibility for PG

Design document for CSC/ECE 517 Fall 2002 Semester Project Security & Visibility for PG Design document for CSC/ECE 57 Fall 2002 Semester Project Security & Visibility for PG Authors: Jianjun Huo Lilian Seow Mack Steadman jhuo@unity.ncsu.edu lseow@us.ibm.com msteadman@triad.rr.com Tiejun

More information

System Requirements Across v6.3. (Revision: June 26, 2018) Document version 1.15

System Requirements Across v6.3. (Revision: June 26, 2018) Document version 1.15 (Revision: June 26, 2018) Document version 1.15 Copyright 2014-2018 Across Systems GmbH The contents of this document may not be copied or made available to third parties in any other way without the written

More information

BW1330. High Performance Hotspot Access Point

BW1330. High Performance Hotspot Access Point BW1330 High Performance Hotspot Access Point 9 July 2008 Overview Hardware Introduction Product Specification Product Features Application Overview Overview The BW1330 Hotspot Access Point is a high-performance

More information

Interoperable Web Services for Computational Portals

Interoperable Web Services for Computational Portals Interoperable Web Services for Computational Portals Marlon Pierce, Choonhan Youn, and Geoffrey Fox Community Grid Labs, Indiana University {marpierce,cyoun,gcf}@indiana.edu Postal Address: 501 N. Morton

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

Web-based secure high performance remote visualization

Web-based secure high performance remote visualization Journal of Physics: Conference Series Web-based secure high performance remote visualization To cite this article: R J Vickery et al 2006 J. Phys.: Conf. Ser. 46 545 View the article online for updates

More information

In the most general sense, a server is a program that provides information

In the most general sense, a server is a program that provides information d524720 Ch01.qxd 5/20/03 8:37 AM Page 9 Chapter 1 Introducing Application Servers In This Chapter Understanding the role of application servers Meeting the J2EE family of technologies Outlining the major

More information

INTRODUCTION TO Object Oriented Systems BHUSHAN JADHAV

INTRODUCTION TO Object Oriented Systems BHUSHAN JADHAV INTRODUCTION TO Object Oriented Systems 1 CHAPTER 1 Introduction to Object Oriented Systems Preview of Object-orientation. Concept of distributed object systems, Reasons to distribute for centralized objects.

More information

Cornell Red Cloud: Campus-based Hybrid Cloud. Steven Lee Cornell University Center for Advanced Computing

Cornell Red Cloud: Campus-based Hybrid Cloud. Steven Lee Cornell University Center for Advanced Computing Cornell Red Cloud: Campus-based Hybrid Cloud Steven Lee Cornell University Center for Advanced Computing shl1@cornell.edu Cornell Center for Advanced Computing (CAC) Profile CAC mission, impact on research

More information

Scaling for the Enterprise

Scaling for the Enterprise White Paper Solutions Business Manager Scaling for the Enterprise by Pete Dohner and Jeremy Vorndam June 2, 2017 Table of Contents Who Should Read This Paper?... 1 Introduction... 1 N-Tier Architecture...

More information

PrinterOn Enterprise/Express

PrinterOn Enterprise/Express PrinterOn Enterprise/Express Configuration Guide Version 4.0.2 Contents Chapter 1: Introduction... 10 PrinterOn Server editions... 10 PrinterOn printers and pools... 11 PrinterOn printers... 11 Secure

More information

QosCosGrid Middleware

QosCosGrid Middleware Domain-oriented services and resources of Polish Infrastructure for Supporting Computational Science in the European Research Space PLGrid Plus QosCosGrid Middleware Domain-oriented services and resources

More information

PrinterOn Server Install Guide

PrinterOn Server Install Guide PrinterOn Server Install Guide Table of Contents 1. Introduction 3 1.1. Architecture Overview 3 2. Before you begin 4 2.1. Account Requirements 4 2.2. Hardware Requirements 4 2.3. Software Requirements

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

Red Hat CloudForms 4.6

Red Hat CloudForms 4.6 Red Hat CloudForms 4.6 Installing Red Hat CloudForms on Red Hat Virtualization How to install and configure Red Hat CloudForms on a Red Hat Virtualization environment Last Updated: 2018-08-07 Red Hat

More information

Software Paradigms (Lesson 10) Selected Topics in Software Architecture

Software Paradigms (Lesson 10) Selected Topics in Software Architecture Software Paradigms (Lesson 10) Selected Topics in Software Architecture Table of Contents 1 World-Wide-Web... 2 1.1 Basic Architectural Solution... 2 1.2 Designing WWW Applications... 7 2 CORBA... 11 2.1

More information

Announcements. me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris

Announcements.  me your survey: See the Announcements page. Today. Reading. Take a break around 10:15am. Ack: Some figures are from Coulouris Announcements Email me your survey: See the Announcements page Today Conceptual overview of distributed systems System models Reading Today: Chapter 2 of Coulouris Next topic: client-side processing (HTML,

More information

Port Utilization in Finesse

Port Utilization in Finesse Utilization in Finesse Utilization Table Columns, page 1 Finesse Utilization, page 2 Utilization Table Columns The columns in the port utilization tables in this document describe the following: A value

More information

Alteryx Technical Overview

Alteryx Technical Overview Alteryx Technical Overview v 1.5, March 2017 2017 Alteryx, Inc. v1.5, March 2017 Page 1 Contents System Overview... 3 Alteryx Designer... 3 Alteryx Engine... 3 Alteryx Service... 5 Alteryx Scheduler...

More information

I/O in the Gardens Non-Dedicated Cluster Computing Environment

I/O in the Gardens Non-Dedicated Cluster Computing Environment I/O in the Gardens Non-Dedicated Cluster Computing Environment Paul Roe and Siu Yuen Chan School of Computing Science Queensland University of Technology Australia fp.roe, s.chang@qut.edu.au Abstract Gardens

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information