The Coastal Science Educational Virtual Appliance (CSEVA)

Author(s):  
Justin R. Davis ◽  
Vladimir A. Paramygin ◽  
Renato J. Figueiredo ◽  
Y. Peter Sheng ◽  
Chrysafis Vogiatzis ◽  
...  
Keyword(s):  
2020 ◽  
Vol 5 (3) ◽  
pp. 69-72
Author(s):  
Yudha Christianto Firmansyah ◽  
Wing Wahyu Winarno ◽  
Eko Pramono

Teknologi virtualisasi dalam dunia komputasi saat ini menjadi topik hangat untuk diperbincangkan dalam pembahasan riset teknologi yang dipergunakan pada server. Virtualisasi dan kontainer merupakan bagian yang sangat penting dalam pengoptimalisasian server, karena sangat berpengaruh pada efisiensi pengelolaan resource infrastruktur server itu sendiri. Pembuatan sebuah server yang baik membutuhkan biaya yang tidak sedikit apalagi untuk membangun hingga menjadi sebuah cloud computing. Supaya biaya dapat ditekan dan murah maka digunakanlah virtualisasi server. Virtualisasi server ialah membangun server pada sebuah komputer atau laptop menggunakan media machineware. Dalam VM tersebut dibangun beberapa server dengan sistem operasi berbeda, baik dari Microsoft Windows maupun Linux dengan variannya, semua sistem operasi berjalan bersamaan. Proxmox merupakan software open source Virtualization Platform untuk menjalankan Virtual Appliance dan Virtual Machine. Proxmox VE adalah distro khusus yang didedikasikan secara khusus sebagai mesin host virtualisasi sistem dan memuat 2 teknologi virtualisasi, yaitu KVM dan OpenVZ. Dari basil penelitian dapat disimpulkan bahwa ProxmoxVE dapat menjalankan mesin virtual secara penuh layaknya baremetal hypervisor. Hal ini ditunjukkan dengan berjalannya beberapa VM dalam satu server untuk menjalankan sistem maupun aplikasi yang dipergunakan pada institusi tersebut sehingga dapat menekan pengeluaran biaya untuk pembelian server.


2014 ◽  
Vol 7 (2) ◽  
pp. 279-292 ◽  
Author(s):  
Gabor Kecskemeti ◽  
Gabor Terstyanszky ◽  
Peter Kacsuk ◽  
Zsolt Nemeth
Keyword(s):  

Author(s):  
Gabor Kecskemeti ◽  
Attila Kertesz ◽  
Attila Marosi ◽  
Peter Kacsuk

Cloud Computing builds on the latest achievements of diverse research areas, such as Grid Computing, Service-oriented computing, business process modeling and virtualization. As this new computing paradigm was mostly lead by companies, several proprietary systems arose. Recently, alongside these commercial systems, several smaller-scale privately owned systems are maintained and developed. This chapter focuses on issues faced by users with interests in Multi-Cloud use and by Cloud providers with highly dynamic workloads. The authors propose a Federated Cloud Management architecture that provides unified access to a federated Cloud that aggregates multiple heterogeneous IaaS Cloud providers in a transparent manner. The architecture incorporates the concepts of meta-brokering, Cloud brokering, and on-demand service deployment. The meta-brokering component provides transparent service execution for the users by allowing the interconnection of various Cloud brokering solutions. Cloud-Brokers manage the number and the location of the Virtual Machines performing the user requests. In order to decrease Virtual Machine instantiation time and increase dynamism in the system, the service deployment component optimizes service delivery by encapsulating services as virtual appliances allowing their decomposition and replication among IaaS Cloud infrastructures. The architecture achieves service provider level transparency through automatic virtual appliance replication and Virtual Machine management of Cloud-Brokers.


2009 ◽  
Vol 23 (6) ◽  
pp. 681-688 ◽  
Author(s):  
Steve Langer ◽  
Nick Charboneau ◽  
Todd French
Keyword(s):  

PLoS ONE ◽  
2010 ◽  
Vol 5 (4) ◽  
pp. e9993
Author(s):  
Jason A. Greenbaum ◽  
Erika Assarsson ◽  
Jo L. Chung ◽  
Steven Head ◽  
Alessandro Sette ◽  
...  

Author(s):  
Amel Haji ◽  
Asma Ben Letaifa ◽  
Sami Tabbane
Keyword(s):  

2019 ◽  
Vol 214 ◽  
pp. 06009
Author(s):  
Rok Pestotnik

Several data samples from a Belle II experiment will be available to the public as a part of the experiment outreach activities. A Belle2Lab tool is designed as an interactive graphical user interface to reconstructed particles, offering users basic particle selection tools. The tool is based on a Blockly JavaScript graphical code generator and can be run in an HTML5 capable browser. It allows a description of different particle decays by selecting and combining particles from the data file, easy histogramming tools and a display of the results by using the JSROOT library. During the analysis, the user has the possibility to apply cuts to the selected variables. A pseudo-code generated by the user interface is sent to the execution server which returns the histograms, that can also be interactively fitted. The Belle2Lab is accessible in two ways: hosted on a single public web server or as a part of the virtual appliance which consists of an Ubuntu 16.04 LTS operating system, a data sample, an analysis framework, and a private web server. The public web server can be used for a single access while the virtual appliance is more suited for a use in a classroom.


2015 ◽  
Vol 7 (2) ◽  
pp. 31-52 ◽  
Author(s):  
Ifeyinwa Eucharia Achumba ◽  
Kennedy Chinedu Okafor ◽  
Gloria N. Ezeh ◽  
Uchenna Hermes Diala

Network forensics vis-a-vis cloud computing offerings can be leveraged to address the needs of enterprise-grade spyware solutions online. A modular, extensible cloud architecture with intrinsic support for efficient security monitoring is proposed and an implementation architecture which facilitates dynamic interface with OpenFlow hardware to create infinite flexibility in managing security decisions is presented. A forensic DataCenter model that integrates remote security monitoring using an intelligent Virtual Security Gateway in a cloud domain was developed as part of the work. An OpenFlow Virtual Appliance is proposed as a security hardware interface for thin clients connected to the Cloud Sypware Robot (CSR) server. The cloud ontology-Software as a Service (SaaS) model was used for the CSR application conveying several security benefits. The goal is to facilitate an open, service-based, online network forensics application that is transparently provisioned for users. The paper proposes a security foundation for next-generation enterprise-grade cloud computing.


Author(s):  
Justin R. Davis ◽  
Vladimir Paramygin ◽  
Bilge Tutak ◽  
Pierre St. Juste ◽  
Renato J. Figueiredo ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document