scholarly journals Sharing Large Datasets between Hadoop Clusters

The real information in other hand for large generous datasets either is direct data oriented stores or circulated license frameworks, in Hadoop being the prevailing open-source lifetime for 'Huge Data'. Real complete clamber stockpiling beginnings, be stroll as it may, bid urge for the competent allotment of expansive datasets over the Internet. Those frameworks that are generally utilized for the spread of extensive records, similar to Bit Torrent, should be adjusted to deal with difficulties, for example, organize joins with both high dormancy and high data transfer capacity, and versatile stockpiling backends wind are streamlined for gushing what's more, not unpredictable access. In this paper, we genuine Dela, a be awarded pounce on lead order supervision structural into the Hops Hadoop stage depart gives a start to finish answer for dataset sharing. Dela is intentional for colossal emerge amassing back ends and counsel trades that are both non-interfering to physical TCP change house and give predominant encipher throughput than TCP on high latency, high transmission capacity organize joins, for example, transoceanic system joins.

Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 135-153
Author(s):  
Khadijeh Moulaei ◽  
Shirin Ayani ◽  
Kambiz Bahaadinbeigy ◽  
Rafat Bayat ◽  
Farhad Fatehi ◽  
...  

The Internet of Things (IOT) has led to ground-breaking changes in the healthcare industry as a promising technological solution. Yet, despite its many benefits, its application has always proven to be challenging. Hence, the purpose of this study is to identify the challenges of using the IOT with the intention of proposing a model for implementing Internet of Things in Iranian hospitals. This study was performed in three phases. In the first phase, the challenges of using the IoT were outlined and introduced. In the second phase the challenges of using the Internet of Things in Iranian hospitals (according to experts) was established during the completion of a two-round Delphi. In the last phase, a novel model for implementing the IoT in Iranian hospitals was proposed. The identified primary model consisted of six groups, namely privacy and security, Big data, hardware, network, software, and organizational-cultural and environmental issues with 78 challenges. Out of the 78 identified challenges, 46 were approved by experts as essential elements for providing IoT patterns in Iranian hospitals. The highest and lowest averages were related to the subgroups "Failure to provide regular IoT rules and programs by governments" and "Absence of single, integrated and efficient platforms with high data transfer capacity and fast processing", respectively. The final model for implementing IoT in Iranian hospitals was designed and presented using Edraw Max10.0.4+Portable software. Providing this model can provide a sufficient basis, information and knowledge for policymakers, government authorities and managers of organizations to use the IoT in hospitals of Iran and other countries. Also, the application of the proposed model can result in the improved special capabilities in the realm of system design, and offer grounds for saving time and money as well as reducing failures in the initial design of IoT projects.


Author(s):  
Onurhan Yılmaz

Open source intelligence (OSINT) is one of the most confrontational topics in cyber security in today's world where technology and data transfer methods are highly developed. It is known that many organizations and individuals use OSINT as an information gathering tool during data transfer over the internet and provide many personal or corporate information access. OSINT is a systematic method that is produced by official and private organizations via sources such as the internet or the media. In recent years there has been some debate about the security and privacy of this information, especially with the widespread use of social media. In this chapter, the control of information obtained by OSINT the security will explain the positive effects on this control mechanism.


Author(s):  
Kin Cheong Chu

There are several different ways to connect to the remote controller, each being adapted to specific situations, such as location and availability of communications equipment. Among these methods, Internet is one of the best choices for remote control as no telephone line is required, high data transfer rate is possible and technical support from dealer or manufacturer through Internet connection. This paper is going to describe the current BMS and its extension through the Internet.


2014 ◽  
Vol 651-653 ◽  
pp. 1607-1610
Author(s):  
Ai Hua Zhang

In this paper, firstly introducing the B/S structure and the WEBGIS technology, giving a brief understanding; then discussing the oil extraction engineering data query system which based on WEBGIS technology and B/S model; and after analyzing we find that: the oil extraction engineering data query system not only takes advantage of the convenience and flexibility of the Internet which is based on WEB, but also the application of the B/S technology has greatly strengthened its transaction processing and security, thus realizing the real business related WEBGIS, achieving high data sharing and interaction, it is more reasonable in oil extraction engineering nowadays.


2016 ◽  
Vol 11 (1) ◽  
pp. 91-103
Author(s):  
Carole Cusack ◽  
David Pecotic

The occult and the internet intersect in four ways: as a static medium for information; as a space where contested information or ideological conflict may occur; as a facilitator of communication; and as a medium for esoteric practice. The last type of activity is rare, but it is intriguing, in that technology can shape and inform beliefs and practices in unanticipated ways. Online engagement with the ‘Work’, the movement produced by the Greek Armenian spiritual teacher and esotericist G. I. Gurdjieff (c. 1866-1949) and his immediate followers, is an under-researched instance of online esoteric practice. This article addresses this scholarly desideratum, bringing the theoretical approaches of online religion and digital ethnography to bear on the Gurdjieff Internet Guide (GIG) website, founded by Reijo Oksanen (b. 1942) and later maintained by Kristina Turner, who created an accompanying Facebook page. The GIG manifests a shift away from the sectarian secrecy of the ‘Foundation’ groups, founded by Jeanne de Salzmann (1889-1990) after Gurdjieff’s death to formalise and protect the content of the Work, and the limited web presence that the Foundation permits. The GIG moves towards an ecumenical ‘open source’ approach to the dissemination of Gurdjieff’s teachings rooted in independent groups founded by other first generation followers of Gurdjieff who remained outside of the Foundation. It is argued that the deregulation of the religious and spiritual marketplace of the contemporary West, coupled with the dominant role played by the Internet in disseminating information, has radically transformed the Gurdjieff tradition, collapsing hierarchies and esoteric strategies, democratizing access for seekers, and creating new ritual and teaching modes.


2018 ◽  
Author(s):  
Andrew Dalke ◽  
Jerome Hert ◽  
Christian Kramer

We present mmpdb, an open source Matched Molecular Pair (MMP) platform to create, compile, store, retrieve, and use MMP rules. mmpdb is suitable for the large datasets typically found in pharmaceutical and agrochemical companies and provides new algorithms for fragment canonicalization and stereochemistry handling. The platform is written in Python and based on the RDKit toolkit. mmpdb is freely available.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


Author(s):  
Е.Н. Юдина

интернет-пространство стало частью реального мира современных студентов. В наши дни особенно актуальна проблема активизации использования интернета как дополнительного ресурса в образовательном процессе. В статье приводятся результаты небольшого социологического исследования, посвященного использованию интернета в преподавании социологических дисциплин. Internet space has become a part of the real world of modern students. The problem of increasing the use of the Internet as an additional resource in the educational process is now particularly topical. The article contains the results of a small sociological study on the use of the Internet in teaching sociological disciplines.


2021 ◽  
Vol 39 ◽  
pp. 100284
Author(s):  
Joseph Molloy ◽  
Felix Becker ◽  
Basil Schmid ◽  
Kay W. Axhausen

2006 ◽  
Vol 40 (3) ◽  
pp. 286-295 ◽  
Author(s):  
Andrew Buxton

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.


Sign in / Sign up

Export Citation Format

Share Document