Solution Brief: Creating a Secure Base in a Virtual World
|
|
- Justin Floyd
- 5 years ago
- Views:
Transcription
1 Soluton Bref: Creatng a Secure Base n a Vrtual World
2 Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved cost effectveness of ncreased server utlzaton. The savngs n rack space, hardware costs, power consumpton, and many other factors are drvng ths steadly ncreasng trend. However, ths boom n logcal servers has resulted n a substantal ncrease n the number of devces connected to the network, and each needs to be ndvdually confgured, patched, and secured. Fortunately, solutons from Shavlk Technologes provde the same secure operatng base and patch management for vrtual machnes as they do for ther physcal counterparts. The Realty of Vrtualzaton In the past few years, medum- to large-szed organzatons have mplemented at least some level of vrtualzaton. Ths trend, whch leverages a sngle physcal resource such as a server to functon as multple logcal servers, s growng at an explosve rate. Research frm IDC estmates that between 2006 and 2009, vrtualzaton wll grow at a compound annual growth rate of almost 50 percent. Vrtualzaton s quckly becomng a realty at most organzatons. Ths document s provded strctly as a gude. provded or expected. Ths rapd growth n vrtualzaton s drven by a number of factors. These nclude better utlzaton of dle or avalable processng power wthn servers, reduced rack space and power consumpton, less hardware acquston and mantenance costs, easer backup, mproved hgh avalablty and dsaster recovery, and centralzed software management. Vrtual Machnes - Real Exposure Whle there are many benefts to vrtualzaton, organzatons must take care to apply approprate securty safeguards. Vrtualzaton can actually ncrease the need for securty, and system and securty admnstrators need to plan for and mplement defenses accordngly. Because each vrtual machne has ts own network address and can be scanned, hacked, nfected, and compromsed just lke a dedcated physcal devce, applyng securty to each ndvdual vrtual machne s as crtcal as securng dedcated physcal devces. Pag e 2
3 Soluton Bref: Creatng a Secure Base n a Vrtual World Although vrtualzaton may cause the number of physcal devces n an organzaton to be reduced, the number of logcal machnes usually ncreases. It s not uncommon to experence an enormous ncrease n the number of logcal servers. Because vrtualzaton allows new servers to be added wthout the costs of deployng new hardware, there s a strong tendency to ncrease the number of logcal servers. Rapd adopton of vrtualzaton technology results n a sgnfcant ncrease n the total number of servers that must be securely confgured and patched. Wth the ncreased number of servers to safeguard, securty and IT admnstrators need to aggressvely and contnuously montor for new devces, servers, and servces. Pror to vrtualzaton when addng a new devce meant deployng new hardware, the addton of new servers and applcatons was naturally throttled due to budget, hardware acquston, rack space, and other tme consumng actvtes. These physcal constrants created a natural process for IT operatons and securty teams to be notfed when new servers were beng added. Vrtualzaton elmnates much of ths process and structure, and as a result new servers and applcatons can appear sgnfcantly faster and easer, oftentmes wthout the coordnaton of the securty team. New vrtual servers can appear wthout authorzaton at all. Securty admnstrators must be equpped wth tools to proactvely dscover new vrtual devces as soon as they appear. Ths document s provded strctly as a gude. provded or expected. Wth the addtonal number of vrtual devces, securty admnstrators must have robust and comprehensve ways of trackng and managng the securty confguraton and patch status of each and every vrtual system. Each one needs ndvdual attenton. For example, an unpatched vrtual machne can stll be exploted, even f the host system s patched and not vulnerable. A common mstake s for IT or securty admnstrators to assume that a well-protected host nsulates the vrtual systems runnng behnd t. That s not the case. A UNIX based host, or any host for that matter, that s up to date wth all securty patches, perfectly confgured and hardened wll not protect a vrtual Mcrosoft IIS server runnng underneath. Lkewse, vrtual machnes and applances potentally carry embedded vulnerabltes and requre specal consderaton for patchng and updates. To establsh an effectve securty baselne, each and every vrtual machne needs ndvdual attenton and management. Pag e 3
4 Soluton Bref: Creatng a Secure Base n a Vrtual World Shavlk Securty For Your Vrtual Machnes One of the myths surroundng vrtual machnes s that the low-level nfrastructure and nterfaces that connect them to the network and management systems are subtly dfferent, and prevent many systems and applcatons from workng wth them. For example, t s commonly (but wrongly) thought that patch management systems wll not effectvely work wth vrtual machnes. Fortunately ths s not the case. Whle t s true that the system hostng the vrtual machne acts as a proxy, t s not true that ths causes problems for patch management. Today s vrtual machne host mplementatons are so well done that the proxes are capable of handlng even low level system orented tasks such as system shut-downs, re-starts, reconfgures, and system updates. Patch management, as mplemented by Shavlk Technologes, works equally well wth vrtual machnes and ther physcal counterparts. Vrtual machnes have the same vsblty to Shavlk s patch and vulnerablty management products as do dedcated machnes. Exstng and new vrtual devces are dscovered n the same way as dedcated devces. They have the same rsks and vulnerabltes, and they are detected n the same manner. Lkewse, securty baselnes are determned and establshed n the same manner. Ths document s provded strctly as a gude. provded or expected. When t comes tme to apply securty updates to vrtual machnes, admnstrators treat them just lke dedcated physcal devces. Vrtual machnes requre the same patches as dedcated devces, and the patches are tested, receved, appled, rolled back f necessary, and managed n the same way. Addtonal Dvdends from Shavlk Not only are Shavlk products compatble wth vrtual machnes, organzatons usng them wll fnd addtonal benefts that are not avalable n other patch and vulnerablty management solutons. Pag e 4
5 Soluton Bref: Creatng a Secure Base n a Vrtual World Agentless Approach Easest Way to Patch Vrtual Machnes Shavlk patch management does not requre agents. Ths has partcular advantages for organzatons rollng out vrtualzaton because of the shear numbers of new vrtual devces. Not only can these new devces be protected by Shavlk, patch and vulnerablty management can be done easly, from a sngle console, n a matter of mnutes. Ths s a tremendous advantage over solutons that requre agents to be nstalled on each new vrtual machne. Deployng and mantanng hundreds or thousands of agents on vrtual machnes wthn large organzatons s a tme consumng, tedous, and expensve effort. An agentless approach s less expensve to acqure, easer to deploy and mantan, and provdes mmedate protecton. Wth Shavlk s agentless approach, organzatons can rapdly accelerate ther level of securty because they can begn assessment, remedaton and generatng useful reports wthn mnutes of a new vrtual machne gong actve. There s lttle to no mpact on the data center or staff. Ths s crtcal gven the nature of contnuous operatons n large data centers. All of these benefts of an agentless approach are magnfed n a vrtual machne envronment, not only because of the rapd growth of vrtual machnes, but because they are more dynamc n nature - comng and gong at a much qucker pace than physcal, dedcated servers. Ths document s provded strctly as a gude. provded or expected. Shavlk Only Vendor Patchng Offlne Vrtual Machnes The unque advantage of usng Shavlk solutons to secure vrtual machnes s the ablty to patch ALL vrtual machnes, both onlne and offlne. As md- to large-szed organzatons have dscovered, patchng offlne machnes can be a real headache. For varous reasons, most enterprses have a sgnfcant number of vrtual mages offlne at any gven tme. Patch management systems can t patch what they can t see, so anythng that s beng servced, or offlne for any reason does not get patched. Whle there are varous technques to deal wth ths and ease the pan, t s stll panful. Everyone wants to see a report that says for a partcular crtcal vulnerablty, 100% of the organzaton s applcable machnes have been patched. Closure for each patch s greatly desred, and no securty offcers want to report to upper management that 77% of the vulnerable machnes have been patched. Untl that report says 100%, a certan amount of anxety or even nausea remans as an awful pt n the stomach of those responsble. Pag e 5
6 Soluton Bref: Creatng a Secure Base n a Vrtual World Shavlk Technologes has developed a way to patch all vrtual machnes, even those that are offlne. Ths ensures that offlne vrtual mages can be n a constant state of readness to be deployed. Shavlk s the only vendor capable of dong ths, and t s a huge beneft to ther customers. For example, many enterprses ntentonally have a sgnfcant number of vrtual machnes offlne at gven perods. One such usage s to ncrease overall uptme and hgh avalablty. Vrtual machnes have made t much easer for organzatons to have redundant machnes for peak processng perods, or to be used durng mantenance, or for hot standby machnes n case of a server falure. However, t s tme consumng and dffcult operatonally to brng these offlne machnes onlne just for patch management. Shavlk customers have the beneft of beng able to perform full vulnerablty management, ncludng patchng, for all of ther vrtual machnes, even those that are offlne. IT and securty staff can quckly verfy and report that 100% of the organzaton s vulnerable machnes physcal, vrtual, and offlne -- have receved a specfc crtcal patch and are protected. Snce offlne machnes can reman offlne whle they are beng patched, another plus for Shavlk customers s mproved securty. Offlne machnes don t have to be on the network and thus at rsk to the very vulnerablty they are beng patched for. Ths document s provded strctly as a gude. provded or expected. Furthermore, ths feature allows the wndow of vulnerablty to be sgnfcantly reduced. For example, some crtcal patches should be appled mmedately, but requre a system reboot. For operatonal reasons t may be dffcult for an organzaton to shut down a server to apply the patch, so they reman operatng wth the vulnerablty untl they can address t. However, wth the ablty to utlze vrtual redundant servers protected by Shavlk, the organzaton can mmedately patch an offlne standby server, and brng t onlne as the producton server. Ths gves the organzaton near mmedate protecton from the vulnerablty wthout havng to dspend servce. The prmary server, can now also be safely patched whle offlne and not vulnerable to attack. Pag e 6
7 Soluton Bref: Creatng a Secure Base n a Vrtual World Summary Conclusons It s clear that vrtualzaton, although a relatvely new trend, s seeng explosve adopton rates. The benefts of vrtualzaton that are drvng ths strong trend are not lmted to just operatonal savngs, but wth the rght securty nfrastructure, nclude a number of securty dvdends as well. Whle t s true that mplementng vrtualzaton wthout proper securty actually ncreases an organzaton s vulnerabltes, t s also true that when properly safeguarded wth Shavlk s agentless solutons and ther unque ablty to secure offlne vrtual servers, an organzaton can experence an mproved level of securty. Shavlk s agentless approach, and unque capablty of patchng offlne vrtual servers and machnes gves organzatons several benefts, ncludng: Proactvely engagng n a contnuous and ongong process to provde vulnerablty and patch management for vrtual machnes. Quck and automatc dscovery of new vrtual machnes, even before they come onlne. Scannng of exstng and new vrtual machnes for vulnerabltes. Report shortcomngs and, f desred, automatcally remedate them. Patch vrtual machnes whle they are offlne, and not subject to attack Ths document s provded strctly as a gude. provded or expected. Allow organzatons to respond mmedately to crtcal vulnerabltes that requre rebootng. Shavlk s powerful technologes and features for securng vrtual machnes make t possble for organzatons to experence all of the above, and many more benefts. Beng able to acheve ths wthout deployng agents makes t possble from both a cost and IT resource perspectve, to effectvely and effcently respond to the sgnfcant ncrease n the total number of logcal servers and devces caused by the mplementaton and growth of vrtual machnes. The myth that vrtual machnes can t be adequately patched s just that a myth. Wth Shavlk not only can they be effcently patched and managed, vrtual machnes can experence greater securty and advantages than ther physcal counterparts. Pag e 7
Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationDLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.
DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationOracle Database: 12c Administrator
Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationFIBARO WALL PLUG OPERATING MANUAL FGBWHWPE-102/FGBWHWPF-102 CONTENTS
OPERATING MANUAL EN FIBARO WALL PLUG FGBWHWPE-102/FGBWHWPF-102 CONTENTS #1: Descrpton and features 3 #2: Parng the accessory 4 #3: Reset 5 #4: Functonalty 6 v1.0 #5: W-F 8 #6: Confgurable parameters 9
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationUSING GRAPHING SKILLS
Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationEnergy-Efficient Workload Placement in Enterprise Datacenters
COVER FEATURE CLOUD COMPUTING Energy-Effcent Workload Placement n Enterprse Datacenters Quan Zhang and Wesong Sh, Wayne State Unversty Power loss from an unnterruptble power supply can account for 15 percent
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationMellanox CloudX, Mirantis Fuel Solution Guide
Mellanox CloudX, Mrants Fuel Soluton Gude Rev.0 www.mellanox.com NOTE: THIS HARDWARE, SOFTWARE OR TEST SUITE PRODUCT ( PRODUCT(S) ) AND ITS RELATED DOCUMENTATION ARE PROVIDED BY MELLANOX TECHNOLOGIES AS-IS
More informationAvaya T3 Telephones connected to Integral 5 Setting up and using conference bridge Appendix to user s guide
Avaya T3 Telephones connected to Integral 5 Settng up and usng conference brdge Appendx to user s gude Issue 1 Integral 5 Software Release 2.6 September 2009 Use conference room Use conference room Your
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationRun-Time Operator State Spilling for Memory Intensive Long-Running Queries
Run-Tme Operator State Spllng for Memory Intensve Long-Runnng Queres Bn Lu, Yal Zhu, and lke A. Rundenstener epartment of Computer Scence, Worcester Polytechnc Insttute Worcester, Massachusetts, USA {bnlu,
More informationConfigure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer
FlashPont Sotware Inc. eomega Pagng Sotware Qualty Sotware For The Fre Alarm Industry Descrpton eomega pagng sotware provdes a means o convertng prnter output rom a Smplex re alarm panel nto short messages.
More informationWireless Temperature Monitoring Overview
Wreless Temperature Montorng Overvew Wreless Temperature Montorng and Alerts. Your Dashboard gves you advanced montorng, alerts (SMS or Emals), graphng and PDF reports from anywhere n the world. Product
More informationWightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK
Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationResolving Ambiguity in Depth Extraction for Motion Capture using Genetic Algorithm
Resolvng Ambguty n Depth Extracton for Moton Capture usng Genetc Algorthm Yn Yee Wa, Ch Kn Chow, Tong Lee Computer Vson and Image Processng Laboratory Dept. of Electronc Engneerng The Chnese Unversty of
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationSecurity. Workplace Manager
User Gude Manageablty and Securty Workplace Manager Congratulatons on your purchase of an nnovatve product from Fujtsu. The latest nformaton about our products, tps, updates etc. can be found on the Internet
More informationAnalysis of 3D Cracks in an Arbitrary Geometry with Weld Residual Stress
Analyss of 3D Cracks n an Arbtrary Geometry wth Weld Resdual Stress Greg Thorwald, Ph.D. Ted L. Anderson, Ph.D. Structural Relablty Technology, Boulder, CO Abstract Materals contanng flaws lke nclusons
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationTripS: Automated Multi-tiered Data Placement in a Geo-distributed Cloud Environment
TrpS: Automated Mult-tered Data Placement n a Geo-dstrbuted Cloud Envronment Kwangsung Oh, Abhshek Chandra, and Jon Wessman Department of Computer Scence and Engneerng Unversty of Mnnesota Twn Ctes Mnneapols,
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationELEC 377 Operating Systems. Week 6 Class 3
ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationEnergy Aware Virtual Machine Migration Techniques for Cloud Environment
Energy Aware rtual Machne Mgraton Technques for Cloud Envronment Kamal Gupta Department of CSE MMU, Sadopur jay Katyar, PhD Department of CSE MMU, Mullana ABSTRACT Cloud Computng offers ndspensable nfrastructure
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationETAtouch RESTful Webservices
ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationINSTALL AND REGISTER PASTEL EVOLUTION
INSTALL AND REGISTER PASTEL EVOLUTION LESSON 1 LEARNING OUTCOME The purpose of ths lesson s to successfully nstall and regster Pastel Evoluton. LEARNING OBJECTIVES On completon of ths lesson, you wll be
More informationAn optimized workflow for coherent noise attenuation in time-lapse processing
An optmzed workflow for coherent nose attenuaton n tme-lapse processng Adel Khall 1, Hennng Hoeber 1, Steve Campbell 2, Mark Ibram 2 and Dan Daves 2. 1 CGGVertas, 2 BP 75 th EAGE Conference & Exhbton ncorporatng
More informationCircuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)
Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,
More informationwith Optic65 and Optic25 Cameras FOR OUTDOOR TRACKING ONLY unless used in conjunction with the Indoor Tracking Accessory.
wth Optc6 and Optc Cameras Quck Start Gude FOR OUTDOOR TRACKING ONLY unless used n conjuncton wth the Indoor Trackng Accessory. CONGRATULATIONS ON SCORING YOUR SOLOSHOT Our category-creatng lne of personal
More informationmquest Quickstart Version 11.0
mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce
More informationVideoJet X10 SN Network Video Server. Installation and Operating Manual
VdeoJet X10 SN Network Vdeo Server en Installaton and Operatng Manual VdeoJet X10 SN VdeoJet X10 SN Table of Contents en 3 Table of Contents 1 Preface 7 1.1 About ths Manual 7 1.2 Conventons n ths Manual
More informationOutline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011
9/8/2 2 Outlne Appendx C: The Bascs of Logc Desgn TDT4255 Computer Desgn Case Study: TDT4255 Communcaton Module Lecture 2 Magnus Jahre 3 4 Dgtal Systems C.2: Gates, Truth Tables and Logc Equatons All sgnals
More informationIf you miss a key. Chapter 6: Demand Paging Source:
ADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Source: http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor If you mss a key after yesterday
More informationUser Manual SAPERION Rich Client 7.1
User Manual SAPERION Rch Clent 7.1 Copyrght 2016 Lexmark. All rghts reserved. Lexmark s a trademark of Lexmark Internatonal, Inc., regstered n the U.S. and/or other countres. All other trademarks are the
More informationCodian MCU MCU 4200 Series
Codan MCU MCU 4200 Seres Gettng started Codan MCU MCU 4200 Seres Gettng started Copyrght Codan 2008. All rghts reserved. Ths Gettng Started Gude may not be coped, photocoped, translated, reproduced, or
More informationkccvoip.com basic voip training NAT/PAT extract 2008
kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of
More informationParallelization of a Series of Extreme Learning Machine Algorithms Based on Spark
Parallelzaton of a Seres of Extreme Machne Algorthms Based on Spark Tantan Lu, Zhy Fang, Chen Zhao, Yngmn Zhou College of Computer Scence and Technology Jln Unversty, JLU Changchun, Chna e-mal: lutt1992x@sna.com
More informationAn Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems
S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,
More informationInternet Traffic Managers
Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationA RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood
A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,
More informationEnergy Saving Techniques in Ad hoc Networks
Energy Savng Technques n Ad hoc Networks 1 Energy Savng Technques n Ad hoc Networks R. Durga Bhavan 1, S. Nagaman 2 and V. Asha 3 1 Asst. Professor, Dept. of CSE, R. K. College of Engneerng, Vjayawada,
More information#4 Inverted page table. The need for more bookkeeping. Inverted page table architecture. Today. Our Small Quiz
ADRIAN PERRIG & TORSTEN HOEFLER Networks and Operatng Systems (-6-) Chapter 6: Demand Pagng http://redmne.replcant.us/projects/replcant/wk/samsunggalaxybackdoor () # Inverted table One system-wde table
More informationChannel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7
Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationCOMPRESSORS. Compressed Air Management System. SIGMA AIR MANAGER 4.0 Key technology for Industrie 4.0 For compressor and blower stations
Compressed Ar Management System SIGMA AIR MANAGER 4.0 Key technology for Industre 4.0 For compressor and blower statons www.kaeser.com SIGMA AIR MANAGER 4.0 Compressed ar control technology 4.0 from KAESER
More informationTwo-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture
Two-Stage Data Dstrbuton for Dstrbuted Survellance Vdeo Processng wth Hybrd Storage Archtecture Yangyang Gao, Hatao Zhang, Bngchang Tang, Yanpe Zhu, Huadong Ma Bejng Key Lab of Intellgent Telecomm. Software
More informationConfiguration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations*
Confguraton Management n Mult-Context Reconfgurable Systems for Smultaneous Performance and Power Optmzatons* Rafael Maestre, Mlagros Fernandez Departamento de Arqutectura de Computadores y Automátca Unversdad
More informationGame Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers
Avaable onlne at www.scencedrect.com Proceda Engneerng 23 (20) 780 785 Power Electroncs and Engneerng Applcaton, 20 Game Based Vrtual Bandwdth Allocaton for Vrtual Networks n Data Centers Cu-rong Wang,
More informationuser journey: a series of steps (typically 4-12) which represent a scenario in which a user might interact with the thing you are designing.
Topc Dscovery user journey: a seres of steps (typcally 4-12) whch represent a scenaro n whch a user mght nteract wth the thng you are desgnng. Two (2) man uses: 1. demonstratng the way users currently
More informationSetup and Use. Version 3.7 2/1/2014
Verson 3.7 2/1/2014 Setup and Use MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com Contents Text2Bd checklst 3 Preparng
More informationSensor-aware Adaptive Pull-Push Query Processing for Sensor Networks
Sensor-aware Adaptve Pull-Push Query Processng for Sensor Networks Raja Bose Unversty of Florda Ganesvlle, FL 326 U.S.A. rbose@cse.ufl.edu Abdelsalam Helal Unversty of Florda Ganesvlle, FL 326 U.S.A. helal@cse.ufl.edu
More informationSupport for Wireless LAN Design
Assocaton for Informaton Systems AIS Electronc Lbrary (AISeL) AMCIS 2005 Proceedngs Amercas Conference on Informaton Systems (AMCIS) 2005 Support for Wreless LAN Desgn Abhjt Dutt Unversty of Wsconsn -
More informationCSE 237A: Final Project Report Object Tracking Willis Hoang & Shimona Carvalho November 27, 2006
CSE 237A: Fnal Project Report Object Trackng Wlls Hoang & Shmona Carvalho November 27, 2006 1 Project Descrpton For ths project, we plan to mplement an object trackng applcaton usng the ntegrated vdeo
More informationMouse Biometric Authentication
Proceedngs of Student-Faculty Research Day, CSIS, Pace Unversty, May nd, 014 Mouse Bometrc Authentcaton Francsco Betances, Adam Pne, Gerald Thompson, Hedeh Zandkarm, and Vnne Monaco Sedenberg School of
More informationTowards High Fidelity Network Emulation
Towards Hgh Fdelty Network Emulaton Lanje Cao, Xangyu Bu, Sona Fahmy, Syuan Cao Department of Computer Scence, Purdue nversty, West Lafayette, IN, SA E-mal: {cao62, xb, fahmy, cao208}@purdue.edu Abstract
More informationCACHE MEMORY DESIGN FOR INTERNET PROCESSORS
CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET
More informationAVL. Mobile Data, AVL & Mapping. Track with Confidence
Moble Data, & Mappng Track wth Confdence 3012 MDT MILEAGE REPORTING 5 GENERAL PURPOSE INPUTS CARD READER & PRINTER CAPABILITIES TEXT MESSAGING MOTOTRBO TM & NEXEDGE TM COMPATIBLE Desgned for Two-Way rado
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationCompressed Air Management System. SIGMA AIR MANAGER 2 Key technology for Industry
Compressed Ar Management System SIGMA AIR MANAGER 2 Key technology for Industry 4.0 www.kaeser.com SIGMA AIR MANAGER 2 Compressed ar control technology 4.0 from KAESER Compressors - BSD 75 - BSD 75 - BSD
More informationAn IPv6-Oriented IDS Framework and Solutions of Two Problems
An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationShared Running Buffer Based Proxy Caching of Streaming Sessions
Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,
More informationSecurity Analysis of IMA Primary Processing System Based on DFTA
Internatonal Conference on Mechatroncs, Electronc, Industral and Control Engneerng (MEIC 2014) Analyss of IMA Based on DFTA Ygang Sun ygsun@cauc.edu.cn Hao L haol0508@163.com Zhen Zhao zhenzhao0523@gmal.com
More informationHigh Utility Video Surveillance System on Public Transport using WiMAX technology
Edth Cowan Unversty Research Onlne ECU Publcatons Pre. 2011 2010 Hgh Utlty Vdeo Survellance System on Publc Transport usng WMAX technology Iftekhar Ahmad Edth Cowan Unversty Daryoush Habb Edth Cowan Unversty
More informationFibre-Optic AWG-based Real-Time Networks
Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationSome material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier
Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)
More informationInfoTerminal Touch Installation Instructions
Order no.: 2071 xx 1. Safety warnngs Electrcal equpment must be nstalled and ftted by qualfed electrcans only and n strct observance of the relevant accdent preventon regulatons. Cut out the crcut breaker
More informationA dynamic bandwidth allocator for virtual machines in a cloud environment
A dynamc bandwdth allocator for vrtual machnes n a cloud envronment Ahmed Amamou, Manel Bourguba, Kamel Haddadou, Guy Pujolle To cte ths verson: Ahmed Amamou, Manel Bourguba, Kamel Haddadou, Guy Pujolle.
More informationDecision Support for the Dynamic Reconfiguration of Machine Layout and Part Routing in Cellular Manufacturing
Decson Support for the Dynamc Reconfguraton of Machne Layout and Part Routng n Cellular Manufacturng Hao W. Ln and Tomohro Murata Abstract A mathematcal based approach s presented to evaluate the dynamc
More informationADRIAN PERRIG & TORSTEN HOEFLER ( -6- ) Networks and Operatng Systems Chapter 6: Demand Pagng Page Table Structures Page table structures Page table structures Problem: smple lnear table s too bg Problem:
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationCisco TelePresence MCU 4200 Series
Csco TelePresence MCU 4200 Seres Gettng started 61-0002-08 Contents General nformaton... 3 About the Csco TelePresence MCU 4200 Seres... 3 Package contents... 3 Port and LED locaton... 3 LED behavor...
More informationOn the Fairness-Efficiency Tradeoff for Packet Processing with Multiple Resources
On the Farness-Effcency Tradeoff for Packet Processng wth Multple Resources We Wang, Chen Feng, Baochun L, and Ben Lang Department of Electrcal and Computer Engneerng, Unversty of Toronto {wewang, cfeng,
More informationSAO: A Stream Index for Answering Linear Optimization Queries
SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationDEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261
More informationA Framework for Distributed Computation Over a Heterogeneous Beowulf Cluster.
A Framework for Dstrbuted Computaton Over a Heterogeneous Beowulf Cluster. Jared A. Heuschele Computer Scence Unversty of Wsconsn-Eau Clare heuschja@uwec.edu Andrew T. Phllps Computer Scence Unversty of
More informationHigh resolution 3D Tau-p transform by matching pursuit Weiping Cao* and Warren S. Ross, Shearwater GeoServices
Hgh resoluton 3D Tau-p transform by matchng pursut Wepng Cao* and Warren S. Ross, Shearwater GeoServces Summary The 3D Tau-p transform s of vtal sgnfcance for processng sesmc data acqured wth modern wde
More informationGeneral Description. Description
June 0 Sheet 0 Metal-Enclosed Swtchgear MVS Medum Voltage Load Interrupter Fusble Swtch General Descrpton.0- Motor Operated MVS Swtches Applcaton Eaton s Cutler-Hammer MVS Pow-R- Drve motor operator makes
More informationSetup and Use. For events not using AuctionMaestro Pro. Version /7/2013
Verson 3.1.2 2/7/2013 Setup and Use For events not usng AuctonMaestro Pro MaestroSoft, Inc. 1750 112th Avenue NE, Sute A200, Bellevue, WA 98004 425.688.0809 / 800.438.6498 Fax: 425.688.0999 www.maestrosoft.com
More informationMotivation. EE 457 Unit 4. Throughput vs. Latency. Performance Depends on View Point?! Computer System Performance. An individual user wants to:
4.1 4.2 Motvaton EE 457 Unt 4 Computer System Performance An ndvdual user wants to: Mnmze sngle program executon tme A datacenter owner wants to: Maxmze number of Mnmze ( ) http://e-tellgentnternetmarketng.com/webste/frustrated-computer-user-2/
More informationAdvanced Computer Networks
Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans
More informationAchieving class-based QoS for transactional workloads
Achevng class-based QoS for transactonal workloads Banca Schroeder Mor Harchol-Balter Carnege Mellon Unversty Department of Computer Scence Pttsburgh, PA USA @cs.cmu.edu Arun Iyengar Erch
More information