windows server
Recently Published Documents


TOTAL DOCUMENTS

166
(FIVE YEARS 23)

H-INDEX

4
(FIVE YEARS 1)

2021 ◽  
Vol 13 (24) ◽  
pp. 13503
Author(s):  
Jakub Rak ◽  
Pavel Tomášek ◽  
Petr Svoboda

This article is focused on the creation of a data model of an information system to support the processes of population sheltering (PoS). PoS processes have undergone significant changes in the Czech Republic. The PoS system was transformed for the use of improvised shelters. For sustainable PoS, it is necessary to standardize the approach of crisis management staff. Key research hypotheses: the data model must respect the methodological framework of planning and implementation of the PoS, especially when used for the design and implementation of the improvised shelters; the standardization of residential buildings can be used to facilitate and streamline the sustainable process of planning of the PoS; the unified data model of the PoS can be considered suitable for standardization and development in the field of sustainable planning and implementation of the PoS. Softwares such as SW QGIS desktop 2.6.0, OpenStreetMap (OSM) spatial database, ESRI shapefile format, and S-JTSK/Krovak East North 5514 coordinate system were used for the verification of the spatial data model, and ASP.NET MVC 4.7.2 Microsoft SQL Server Express 2019, jQuery 3.3.1, Bootstrap 3.4.1, Kendo UI 2019.1.220, and virtual Windows Server 2016 were used for the implementation of the physical data model. The physical data model substantiates the benefits.


2021 ◽  
pp. 59-113
Author(s):  
Richard M. Hicks
Keyword(s):  

2021 ◽  
Vol 3 (3) ◽  
pp. 415-419
Author(s):  
Eri Sasmita Susanto ◽  
Arsi Dwi Septiarini ◽  
Yunanri W

This study aims to implement a wifi hotspot at MTsN 1 Sumbawa Besar to minimize network disturbances. This research is implemented using network devices such as Mikrotik Router, Windows Server 2007 and other supporting network devices. The network development method uses the Network Development Life Cycle (NDLC) approach. It is starting with the process of analysis, design, simulation to implementation. The instrument of data collection techniques in the study used observation, interviews, documentation and literature study. The final result of this research is to implement a hotspot network that can cover the entire madrasa area. MTsN 1 Sumbawa Besar canAccess the internet without any network disturbances.


Author(s):  
Koné Forokoro ◽  
Mouneri Maïga ◽  
Mohamed S. Maïga

Since 1992, implement decentralization reformin Mali has made it possible to empower  populations in their own development planning. Resources distribution to local authorities requires detailed information of the constraints and the assets linked to their development. Data collected on  rural area are often poorly defined, redundant or incomplete and inefficiencies for sharing due to a lack of applied standard tools. The information is too descriptive and it is difficult to extract useful one for decision making process. There is inadequate information upon which to base resource allocation decisions. The purpose of this paper is to define data that can be collected on rural municipalities or localities and handled by GIS to make information available for decision-makers, planners and beneficiaries. The data used from Malian poverty survey performed in 2001-2002 focused on the satisfaction of basic household needs. This concept is based on meeting those who lack access to basic living needs, which generally include clean water, sanitation, nutrition, primary health services, and basic education. The method used the platform of "MapGIS IGS, IIS6, Windows Server 2003, ASP.NET and MS SQL Server 2000" to develop an application GIS Web Service. Data are integrated and published as services by the platform. The product output have been tested successfully on the intranet of Wuhan Zondy Cyber in the term of interoperability and extraction of the information needed. With this tool, each local authority can be a potential collector of his own data and participates to update the database. The Web Services model of the GIS systems described provides to users, services and data they need, without having to install, learn, or pay for any unused functionalities. The extension of this standardization in all ECOWAS countries would be a great advantage regarding the sharing of geographic information between countries.


2020 ◽  
Vol 9 (2) ◽  
Author(s):  
Juan Carlos Broncano Torres ◽  
Mirtha Sussan Trejo de Ríos ◽  
Héctor Alexis Herrera Vega ◽  
Eugenio Evaristo Andrade Flores
Keyword(s):  

Objetivo: Elaborar un software de seguridad y acceso vehicular mediante algoritmos de reconocimiento de caracteres con ayuda de visión artificial. Materiales y métodos: Maqueta a escala de la puerta de ingreso N° 03, a la UNJFSC, dos cámaras con resolución de 640x480 y 1080x720, Imagen Acquisition Tool de Matlab, Windows Server y MySQL. El tipo de investigación fue descriptivo, con un diseño experimental, a un nivel aplicativo. Para medir el grado de robustez del software, se puso a prueba los siguientes parámetros: Ángulo de inclinación de la cámara respecto a la matrícula y tamaño de los caracteres. Resultados: Respecto al reconocimiento de las placas vehiculares se obtuvo, en la detección del patrón un 94% de exactitud y en la lectura de los caracteres un 92%, en todas las pruebas realizadas. Además, si colocamos la cámara con un ángulo de 35° respecto a la matricula obtenemos una eficacia en la lectura de los caracteres del 88%, mientras que si la colocamos de manera frontal conseguimos el 95%. Conclusiones: La aplicación creada optimiza eficientemente el sistema de seguridad y control de acceso, pues disminuye aproximadamente en un 87% el tiempo de congestión vehicular al momento de ingresar a las instalaciones. Por lo tanto, puede ser aplicada a cualquier institución que presente los mismos problemas.


2020 ◽  
Vol 7 (3) ◽  
pp. 439
Author(s):  
Eri Riana

Cloud Computing technology is a new paradigm in the delivery of computing services, Cloud Computing has many advantages compared to conventional systems usually. The development of business at this time began to compete globally to be able to satisfy customers, so companies need access to information that is fast and accurate. In order to access information quickly, companies need to build Information and Communication Technology infrastructure that requires large capital, on the other hand cloud computing is present as an alternative solution. Services provided by cloud computing include hardware, infrastructure, platforms and applications. Cloud computing is very useful, because it can reduce computing costs, increase reliability and provide considerable opportunities for the industrial world. One company that provides cloud computing services is Google. The features of cloud computing are believed to be far more efficient and satisfying. The problem that arises is how companies implement Cloud Computing using Google Cloud and how to carry out the process of deployment and provisioning of Google Cloud SQL Database. The purpose of this research is to provide a study of the benefits of implementing Google Cloud for companies to improve business competitiveness so tightly. This research uses Agile method and literature study, which begins with planning, implementation, testing, documentation, deployment, maintenance, problem identification and analysis and discussion related to Google Cloud, where the results of this research are that Google Cloud can create a model business is more flexible, and faster. The purpose of writing this journal is to provide an overview of the understanding of cloud computing and its development as well as the advantages and disadvantages of companies that use Cloud Computing technology. Based on these searches it is known that Cloud Computing as a technology that utilizes internet services uses a virtual central server for the purpose of maintaining data and applications. The existence of Cloud Computing itself has caused changes in the workings of information technology systems in a company. Security and data storage systems are important for companies. Cloud Computing technology has provided huge benefits for most companies. To carry out the process, the device needs to be prepared include hardware such as HPE DL 20 Gen 10 E-2136-4 SFF Server Computer, 2x1 TB SATA 7.2K 3.5 "Hard Drive, 256GB RAM, minimum bandwidth of 5 Mbps and software requirements including Windows Server 2012 R2 Enterprise, VMM, Google Cloud Platform Enterprise, SQL Server 2012


2020 ◽  
Vol 11 (1) ◽  
pp. 47
Author(s):  
Yuliana Cahyaningrum ◽  
Indrastanti Ratna Widiasari

Abstract. As a new virtualization technology, many things about container technology need to be explored . One of them is data security issue when this technology is applied in a network. The study aims to discover a container performance when a server is being attacked by a malware. In this research, the container is installed natively on Windows Server 2016 and using Docker as the platform. Two groups of malware are used that each group has different effect on the server system. The results show that the malware used in this research does not affect the container performance yet it affects the network used by the container. The calculation results point out an increasing delay at HTTP protocol when the server is being attacked by malware group A which is from 0.028335 ms to 2.2698161 ms. The attack of group B malware on the server caused the website inside the container inaccessible. This is because group B malware also attacked the network server where the container is holding to.Keywords : Virtualization, Container, Malware, Native, Windows Server 2016, Docker.Abstrak. Sebagai teknologi virtualisasi yang baru, banyak hal yang perlu digali tentang teknologi container. Salah satunya adalah masalah keamanan data jika teknologi ini diterapkan dalam jaringan. Penelitian bertujuan untuk mengetahui performa container bila server mendapat serangan dari malware. Pada penelitian ini container dipasang secara native pada Windows Server 2016 dan menggunakan Docker sebagai platform. Dua kelompok malware digunakan dalam penelitian ini dimana setiap kelompok memiliki efek yang berbeda pada sistem server. Hasil menunjukkan bahwa malware yang digunakan dalam penelitian ini tidak mempengaruhi kinerja container, tetapi mempengaruhi network yang digunakan oleh container. Hasil penghitungan menunjukkan kenaikan delay pada protokol HTTP pada saat server mengalami serangan malware kelompok A yaitu dari 0.028335 ms sampai 2.2698161 ms. Serangan malware kelompok B pada server menyebabkan website yang ada di dalam container tersebut tidak dapat diakses. Hal ini disebabkan malware kelompok B juga menyerang network server dimana container tersebut menginduk.Kata Kunci : Virtualisasi, Container, Malware, Native, Windows Server 2016, Docker.


Author(s):  
Nikola Davidović ◽  
Slobodan Obradović ◽  
Borislav Đorđević ◽  
Valentina Timčenko ◽  
Bojan Škorić

The rapid technological progress has led to a growing need for more data storage space. The appearance of big data requires larger storage space, faster access and exchange of data as well as data security. RAID (Redundant Array of Independent Disks) technology is one of the most cost-effective ways to satisfy needs for larger storage space, data access and protection. However, the connection of multiple secondary memory devices in RAID 0 aims to improve the secondary memory system in a way to provide greater storage capacity, increase both read data speed and write data speed but it is not fault-tolerant or error-free. This paper provides an analysis of the system for storing the data on the paired arrays of magnetic disks in a RAID 0 formation, with different number of queue entries for overlapped I/O, where queue depth parameter has the value of 1 and 4. The paper presents a range of test results and analysis for RAID 0 series for defined workload characteristics. The tests were carried on in Microsoft Windows Server 2008 R2 Standard operating system, using 2, 3, 4 and 6 paired magnetic disks and controlled by Dell PERC 6/i hardware RAID controller. For the needs of obtaining the measurement results, ATTO Disk Benchmark has been used. The obtained results have been analyzed and compared to the expected behavior.


Sign in / Sign up

Export Citation Format

Share Document