Simulation Still Rules: Modern Computer Systems Architecture Visualized and Laid Bare

Author(s):  
Besim Mustafa
Author(s):  
Usman Javed Butt ◽  
Maysam F. Abbod ◽  
Arvind Kumar

Marketing is a process of creating, capturing, and exchanging ‘value' for the mutual benefits of marketers, customers, intermediaries, and other stakeholders. Such a transaction requires trust as it might be facing a range of online cyber risks. Modern cybercrimes have exponentially grown over the last decade. Ransomware is one of the types of malware which is the result of a sophisticated attempt to compromise the modern computer systems. The businesses, governments, and large corporations are investing heavily to combat this cyber threat against their critical infrastructure. New technological shifts help to improve marketing and business productivity and keep the company's global competitiveness in an overflowing competitive market. However, the businesses and the systems involved need security measures to protect integrity and availability which will help avoid any malfunctioning to their operations due to the cyber-attacks. There have been several cyber-attack incidents on several businesses such as healthcare, pharmaceutical, water cleaning, and energy sector.


Author(s):  
Michael Kramer ◽  
Martin Horauer

Embedded Systems software reliability is increasingly important, therefore methods to harden existing software are needed. In general, hardening software against various failures is a necessity in modern computer systems. A lot of work has been published regarding many possible ways to achieve this non-functional requirement. Relevant topics include, e.g., test procedures, recommended development flows, and hardware measures like watchdog timers. One of these methods seems very promising to be software implemented in modern embedded systems: Control Flow Checking by signatures. Various authors have shown the effectiveness and feasibility of Control Flow Checking (CFC) by signatures for personal computer software. For instance it has been shown for standard computer-systems, that CFC is capable of reducing undetected control flow errors by at least one magnitude. This survey will focus on the applicability of such software hardening methods to embedded systems, while adhering mainly to software based approaches. Published methods will be summarized and compared. Furthermore methods to simplify derived control-flow graphs to essential states will be emphasized. Finally the possibility to apply run-time verification to the Control-flow Checking Software is considered.


Metallurgist ◽  
2016 ◽  
Vol 60 (1-2) ◽  
pp. 179-185
Author(s):  
M. A. Tovmasyan ◽  
S. V. Samusev ◽  
V. A. Sazonov

Author(s):  
Saqib Saeed ◽  
Markus Rohde

Nonprofit organizations are an important sector of society working to support underprivileged citizens. The operations of nonprofit organizations differ from their organizational size, scope, and application domain. Modern computer systems are quite effective in managing organizational tasks, but the nonprofit sector lacks in technological systems concerning organizational settings. In order to foster a successful use of electronic services, it is vital that computer systems are appropriate according to user needs. The diversity of users and their work practices in nonprofit organizations make it difficult for standardized infrastructure to work optimally in diverse organizational settings. In this chapter, the authors discuss the issues and complexities associated with system design for nonprofit organizations. They analyze important open issues that need to be explored for appropriated technology design in this domain.


Auditor ◽  
2021 ◽  
pp. 52-57
Author(s):  
N. Mislavskaya

The article is devoted to the problems that await the national accounting system in the future in connection with the development of digital technologies and the corresponding use of artificial intelligence. The complexity of accounting tasks to reflect economic reality in the context of increasing the significance of probabilistic expert assessments is analyzed from the point of view of the utilitarian capabilities of modern computer systems. As a result, the author comes to the conclusion that it is impossible and unacceptable to eliminate accounting employees from their professional duties. Otherwise, the magnitude of the accumulated errors will affect the financial statements and the declared data will become risky and unsuitable for making management decisions.


2021 ◽  
Vol 48 (3) ◽  
pp. 37-38
Author(s):  
Kristen Gardner ◽  
Jazeem Abdul Jaleel ◽  
Alexander Wickeham ◽  
Sherwin Doroudi

In large-scale computer systems, deciding how to dispatch arriving jobs to servers is a primary factor affecting system performance. Consequently, there is a wealth of literature on designing, analyzing, and evaluating the performance of load balancing policies. For analytical tractability, most existing work on dispatching in large-scale systems makes a key assumption: that the servers are homogeneous, meaning that they all have the same speeds, capabilities, and available resources. But this assumption is not accurate in practice. Modern computer systems are instead heterogeneous: server farms may consist of multiple generations of hardware, servers with varied resources, or even virtual machines running in a cloud environment. Given the ubiquity of heterogeneity in today's systems, it is critically important to develop load balancing policies that perform well in heterogeneous environments. In this paper, we focus on systems in which server speeds are heterogeneous.


Sign in / Sign up

Export Citation Format

Share Document