scholarly journals Open source licensing notices in Web applications

2011 ◽  
Vol 3 (1) ◽  
pp. 81-90
Author(s):  
Arnoud Engelfriet
Keyword(s):  
Author(s):  
Faried Effendy ◽  
Taufik ◽  
Bramantyo Adhilaksono

: Substantial research has been conducted to compare web servers or to compare databases, but very limited research combines the two. Node.js and Golang (Go) are popular platforms for both web and mobile application back-ends, whereas MySQL and Go are among the best open source databases with different characters. Using MySQL and MongoDB as databases, this study aims to compare the performance of Go and Node.js as web applications back-end regarding response time, CPU utilization, and memory usage. To simulate the actual web server workload, the flow of data traffic on the server follows the Poisson distribution. The result shows that the combination of Go and MySQL is superior in CPU utilization and memory usage, while the Node.js and MySQL combination is superior in response time.


2010 ◽  
Vol 2 (3) ◽  
pp. 30-47 ◽  
Author(s):  
Michael G. Leahy ◽  
G. Brent Hall

This paper discusses the research-based origins and modular architecture of an open source geospatial tool that facilitates synchronous individual and group discussions using the medium of a Web map service. The software draws on existing open source geospatial projects and associated libraries and techniques that have evolved as part of the new generation of Web applications. The purpose of the software is discussed, highlighting the fusion of existing open source projects to produce new tools. Two case studies are briefly discussed to illustrate the value an open source approach brings to communities who would remain otherwise outside the reach of proprietary software tools. The paper concludes with comments on the project’s future evolution as an open source participatory mapping platform.


2020 ◽  
Vol 3 (1) ◽  
pp. 11-16
Author(s):  
Mihăiță Rădoi ◽  
◽  
Petrică Ciotîrnae ◽  

Under the current global conditions, strong emphasis is put on saving resources and reducing costs, migrating to collaborative unified communications solutions and developing open-source Web applications. The secure video-conferencing system will mainly use VoIP and WebRTC technologies to make multimedia calls, allowing end-users mobile and remote access (MRA) and therefore to facilitate communication between different networks, as well as the accessibility and the interoperability with any type of technology and device. This article will analyze the scalable implementation of the real-time communications network, providing redundancy and load balancing, therefore ensuring the high availability of the entire collaborative communications system. The call control and the dial plan are done through the Unified Call Manager software and WebRTC videoconferencing external access functionality is provided by configuring Traversal Using Relays around NAT (TURN) service across the Expressway Series server pair (Core & Edge). The ability to manage and monitor virtual meetings remains the responsibility of the open-source management tools.


2020 ◽  
Vol 8 (4) ◽  
pp. 154-159
Author(s):  
Kamaran H.A Faraj ◽  
Asan B. Kanbar ◽  
Jaza Gul-Mohammed ◽  
Wafaa M. Hmeed ◽  
Shagul F. Karim

Since the traditional time loading (TTL) very primitive before the era of information communication technology (ICT) and it was really not depended on the result of time-loading due to the old version of computer architecture (i.e. serial processing). Nevertheless, the parallel processing systems open a wide area of researching for electronic time loading (ETL) over different operating systems by programing languages (i.e. python or private home page (Php)). The electronic time loading (ETL) for cloud Computing (CC) is a hot experimental topic.  ETL for CC is not only one parameter (i.e. a web technologies type or a web applications type or an infrastructures type or an architectures type). Moderately, the term CC refers to the evolution of the information technology (IT). As we realized the ETL is very important for reducing time wasting. The reducing time-waste loading over different web operating systems or CC is a target in this paper.  Finally, this paper test the Electronic Loading Time of CC over different operating systems with different types of network (i.e. public and private) discovering the least ETL. Hence the benchmarking TTL is not applicable (N/A) due to the activity from a person to others is very changeable and not depended on it at all.  This paper shows the total time and load time over different OS in seconds, and find out the least time loading required this work is a good solution of the response time over different operating system in open source-LOS and non-open source WOS.


2019 ◽  
Author(s):  
Ayman Yousif ◽  
Nizar Drou ◽  
Jillian Rowe ◽  
Mohammed Khalfan ◽  
Kristin C Gunsalus

AbstractBackgroundAs high-throughput sequencing applications continue to evolve, the rapid growth in quantity and variety of sequence-based data calls for the development of new software libraries and tools for data analysis and visualization. Often, effective use of these tools requires computational skills beyond those of many researchers. To ease this computational barrier, we have created a dynamic web-based platform, NASQAR (Nucleic Acid SeQuence Analysis Resource).ResultsNASQAR offers a collection of custom and publicly available open-source web applications that make extensive use of a variety of R packages to provide interactive data analysis and visualization. The platform is publicly accessible at http://nasqar.abudhabi.nyu.edu/. Open-source code is on GitHub at https://github.com/nasqar/NASQAR, and the system is also available as a Docker image at https://hub.docker.com/r/aymanm/nasqarall. NASQAR is a collaboration between the core bioinformatics teams of the NYU Abu Dhabi and NYU New York Centers for Genomics and Systems Biology.ConclusionsNASQAR empowers non-programming experts with a versatile and intuitive toolbox to easily and efficiently explore, analyze, and visualize their Transcriptomics data interactively. Popular tools for a variety of applications are currently available, including Transcriptome Data Preprocessing, RNA-seq Analysis (including Single-cell RNA-seq), Metagenomics, and Gene Enrichment.


Author(s):  
Kevin Gary ◽  
Harry Koehnemann

The software engineering community touts component-based software engineering as a solution for many of its woes including reducing cycle time, reducing costs, increasing productivity, allowing easier integration to name just a few. Indeed, many Web-based systems are now built with open-source and vendor provided component technologies. While these advances have led to improvements in the development process, they have also led to a great deal of pressure on downstream processes as these systems must be deployed, tuned, and supported. The complexities in deploying and supporting component- based software for distributed and Web-based applications are not understood in the academic or professional communities. This chapter stresses the need for addressing this problem by presenting component-based software for Web applications from a deployment perspective, characterizing the issues through real-world experiences with highly component-based applications, and presents strategies and directions for the community to pursue.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 941 ◽  
Author(s):  
M Surekha ◽  
K Kiran Kumar ◽  
M V.S.Prasanth ◽  
P S.G.Aruna Sri

Web Applications security has turned out to be logically more essential nowadays. Tremendous quantities of assaults are being sent on the web application layer. Because of emotional increment in Web applications, security gets helpless against assortment of dangers. The ma-jority of these assaults are focused towards the web application layer and system firewall alone can't keep these sorts of assaults. The essen-tial explanation for achievement of these assaults is the numbness of utilization designers while composing the web applications and the vulnerabilities in the current advancements. Web application assaults are the most recent pattern and programmers are attempting to abuse the web application utilizing diverse strategies. Different arrangements are accessible as open source and in business showcase. Be that as it may, the choice of appropriate answer for the security of the authoritative frameworks is a noteworthy issue. This overview paper looked at the Web Application Firewall (WAF) arrangements with critical highlights essential for the security at application layer. Basic examination on WAF arrangements is useful for the clients to choose the most appropriate answer for their surroundings.  


Sign in / Sign up

Export Citation Format

Share Document