Discussion on the Construction of the Campus Desktop Virtualization

2014 ◽  
Vol 610 ◽  
pp. 699-702
Author(s):  
Hong Wang ◽  
Ming Yan Wang

In this paper, the current problems and demands of campus information system was analyzed and the desktop virtualization solutions were probed. Thus, under the cloud system structure, the user can simply login by the client in desktop systems of data center, as well as traditional computer operating. As a result, the flexibility and security in application of resources are enhanced. More over, schools can avoid the repeated investment and reduce the pressure on hardware and software maintenance, and improve the working efficiency.

2013 ◽  
Vol 416-417 ◽  
pp. 1444-1449
Author(s):  
Xue Li Wang

The ordinary cloud system is confronted with various threats in trust and security perspective, which have influenced the extensive use of cloud system. Aiming at the defects in the trusted secure design of the ordinary cloud system frame, a trusted secure cloud system has been designed.


2016 ◽  
Vol 11 (5) ◽  
pp. 129 ◽  
Author(s):  
Oluyemisi Rachael Arowolo ◽  
Ayoib Che-Ahmad

Monitoring mechanisms are tools for companies to protect the interests of the shareholders, most especially, the minority shareholders from the deviant behaviour of the management and board members. This study examines the relationship between monitoring mechanisms (directorship, internal and external auditing), gender and information system structure in Nigerian non-financial listed companies. The empirical tests for the study are by quantitative analysis approach with data from annual reports and questionnaires (for information system structure and internal auditing not obtainable from annual reports). The findings reveal that both gender and information system structure significantly relates to monitoring mechanisms (directorship, internal auditing and external auditing). This empirical study adds to the literature on the antecedents of organizational attributes in respect of gender and information system structure as related to monitoring mechanisms, particularly in Sub-Saharan African. Likewise, the findings suggest policy implication for the board of directors regarding appropriate board composition and structuring of the information system of a company to mitigate agency problems.


2020 ◽  
pp. 2-13
Author(s):  
Vadim Kuchurov ◽  
◽  
Roman Maximov ◽  
Roman Sherstobitov ◽  
◽  
...  

Regulators charge to counter information security threats against the structural and functional characteristics of the information system to ensure the information security requirements. These requirements include information system structure and composition, information technologies and functioning characteristics, physical and logical, functional and technological interconnections between information system segments. They order false components of information system emulation as a basic step of protection, as well as information technologies hiding, information system configuration management and its switching to predetermined configuration that provides a protection. However that steps are not included into basic set and they protection aims are reached with compensative assets, formalizing and implementing inhibitory orders and set of organizational and technical measures on threat source. The purpose of research – to disclose and to state main ways of search of new technical solutions for structure masking of distributed information systems in cyberspace implementing masking traffic taking into account the requirements for the timeliness of information exchange. The method of research – operations research in the face of uncertainty, the application of the theory of Markov processes and Kolmogorov equation for solving the problem of increasing the efficiency of masking exchange. The result of research – finding the probabilistic and temporal characteristics of the functioning process of the data transmission network when applying technical solutions for information systems masking in cyberspace. The results obtained make it possible to explicitly implement protection measures aimed at forming persistent false stereotypes among violators about information systems and control processes implemented with their help.


2021 ◽  
Vol 92 (3) ◽  
pp. 1832-1853 ◽  
Author(s):  
Catherine Péquegnat ◽  
Jonathan Schaeffer ◽  
Claudio Satriano ◽  
Helle Pedersen ◽  
Jérôme Touvier ◽  
...  

Abstract The Résif project, which started in 2008, aims at gathering under a common research infrastructure the French seismological, Global Navigation Satellite Systems and gravimeter permanent networks, as well as the mobile instrument pools. A central part of Résif is its seismological information system, Système d'Information de Résif (Résif-SI) (started in 2012), which is in charge of collecting, validating, archiving, and distributing seismological data and metadata from seven national centers. Résif-SI follows a distributed architecture, in which the six data collection and validation centers (A-nodes) send validated data and metadata to a national data center (Résif Data Center [Résif-DC]), which is the central point for data archiving and distribution. Résif-SI is based on international standard formats and protocols, and is fully integrated into European and international data exchange systems (European Integrated Data Archive, European Plate Observing System [EPOS], Incorporated Research Institutions for Seismology, International Federation of Digital Seismograph Networks). In this article, we present the organization of Résif-SI, the technical details of its implementation, and the catalog of services provided to the end users. The article is aimed both at seismologists, who want to discover and use Résif data, and at data center operators, who might be interested in the technical choices made in the implementation of Résif-SI. We believe that Résif-SI can be a model for other countries facing the problem of integrating different organizations into a centralized seismological information system.


2021 ◽  
Vol 3 (2) ◽  
pp. 467-481
Author(s):  
Monika Prianti ◽  
Frederik Samuel Papilaya

The GKJ Synod is one of the Church Foundations located in Salatiga which is an institution that focuses on the field of information data center and media services for the GKJ Synod. The Salatiga GKJ Synod currently has a system but still has problems with Information System problems that have not been implemented optimally, so there are often obstacles when doing work. Because it does not run quickly and well, therefore an Information System Strategic Planning is needed, this research aims to be able to help the business processes contained in the GKJ Synod implement information systems in the organization to run well. The purpose of this research is to propose and plan using the method Enterprise Architecture Planning. Enterprise Architecture Planning (EAP) is the process of defining the architecture in the use of information systems to support the architecture implementation plan. By using the approach, the Enterprise Architecture Planning (EAP)method can help the GKJ Salatiga synod to plan data quality oriented to business needs in order to achieve and support business goals for agencies and organizations, besides that, the advantages of using Enterprise Architecture Planning are a supporting method for making decisions and good planning for an organization.


2021 ◽  
Vol 31 (2) ◽  
pp. 49-60
Author(s):  
D. A. Palguev

Formulation of the problem. The development of information systems for collecting, processing and exchanging radar information occurs, on the one hand, in the direction of improving the technical characteristics of information processing facilities and data transmission facilities, on the other hand, in the direction of improving information processing algorithms and the structure of the information system. This article summarizes the possibilities for the development of information systems in the second direction.Purpose. Development of a variant of building an information system with a fully connected network structure and intended for the collection, processing and exchange of radar information.Results. The development, as a tool for building an information system of a network structure, is based on an integrated approach that provides for the use of an algorithm without branching solutions for information processing, a network semi-connected structure itself and network algorithms, a higher level than the level of collection and processing, for organizing functioning of information exchange in the network. The short processing time of information when entering it into the system makes it possible to create a dynamic array of homogeneous radar data, updated when radar information arrives from sources.Practical significance. Information systems, wholly or partly built on the basis of such an integrated approach, are applicable in areas such as air traffic control systems; multi-beam and multi-range radars (ornithological, meteo, etc.), radars for security complexes, incoherent spatially-separated radar information sources, combined into a system (for example, for studying the ionosphere).


Sign in / Sign up

Export Citation Format

Share Document