computer centers
Recently Published Documents


TOTAL DOCUMENTS

58
(FIVE YEARS 2)

H-INDEX

3
(FIVE YEARS 0)

2021 ◽  
Vol 11 (18) ◽  
pp. 8293
Author(s):  
Federico Gargiulo ◽  
Dirk Duellmann ◽  
Pasquale Arpaia ◽  
Rosario Schiano Lo Moriello

Today, cloud systems provide many key services to development and production environments; reliable storage services are crucial for a multitude of applications ranging from commercial manufacturing, distribution and sales up to scientific research, which is often at the forefront of computing resource demands. In large-scale computer centers, the storage system requires particular attention and investment; usually, a large number of diverse storage devices need to be deployed in order to match the varying performance and volume requirements of changing user applications. As of today, magnetic drives still play a dominant role in terms of deployed storage volume and of service outages due to device failure. In this paper, we study methods to facilitate automated proactive disk replacement. We propose a method to identify disks with media failures in a production environment and describe an application of supervised machine learning to predict disk failures. In particular, a proper stage to automatically label (healthy/at-risk) the disks during the training and validation stage is presented along with tuning strategy to optimize the hyperparameters of the associated machine learning classifier. The approach is trained and validated against a large set of 65,000 hard drives in the CERN computer center, and the achieved results are discussed.


2020 ◽  
Vol 10 (1) ◽  
pp. 88
Author(s):  
Cheyvuth Seng ◽  
May Kristine Jonson Carlon ◽  
Jeffrey Scott Cross

This paper aims to assess the effectiveness of research self-efficacy short-term information technology (IT) skills training intervention administered to 3rd year and 4th year undergraduate students at three provincial Cambodian universities. The training intervention was conducted at the universities' computer centers where the internet could be accessed. The training lasted three weeks for 60 hours in total and covered topics such as using statistical analysis software, Massive Open Online Courses (MOOCs), and referencing software. The participants were 461 undergraduate students at universities during the 2018 academic year. The survey method used for this study was based on the “Research Self-Efficacy Scale” by Phillips and Russell (1994), which was administered before and after the training. The research used descriptive statistics and paired sample t-test for data analysis. The findings of the study revealed that the participants’ research self-efficacy perceptions increased after conducting the intervention. The results showed that there was a significant increase in mean score after intervention based upon a 5-point scale from 2.10 (SD = 0.68) before the intervention to 3.57 (SD = 0.54) afterward. These findings suggest that IT training intervention is beneficial for undergraduate students at provincial universities in Cambodia resulting in an improvement in research self-efficacy.


2018 ◽  
Vol 12 (12) ◽  
pp. 163
Author(s):  
Basima Elshqeirat ◽  
Sieteng Soh ◽  
Suresh Rai ◽  
Saher Manaseer

This paper addresses an NP-complete problem of designing a network topology (NT) with the maximum 2-terminal reliability (R) subject to a cost constraint (C). More specifically, given the locations of the various computer centers (nodes), their connecting links, each link’s reliability and cost, and the maximum budget cost to install the links, the NT design problem, called NTD-RC, aims to find an NT that has the maximum reliability with cost within the budget. Since cost is a major issue in NT design, NTD-RC is applicable for critical applications requiring maximized reliability. This paper formulates a dynamic programming (DP) scheme to help solve NTD-RC. A DP approach, called Algo-DP, finds the set of links to be deleted from the original network to obtain an optimal NT. The paper proposes five-link ordering criteria to improve the performance of Algo-DP. Simulation results on different benchmark networks of various sizes are used to compare Algo-DP with existing techniques in the literature and show the merits of using the sorting methods, and the effectiveness of our algorithm. We found that Algo-DP generates NT with the same or better 2-terminal reliability measure (with up to 4.3% improvement) on 92% of the network topologies. Results indicate Algo-DP demonstrated better performance than other existing algorithm. Furthermore, Algo-DP shows that it is computationally more efficient compared to the recent existing approach.


2018 ◽  
Vol 20 (1) ◽  
pp. 159-198 ◽  
Author(s):  
J. CARLES MAIXÉ-ALTÉS

This work is a contribution to the study of the adoption and use of computers in the savings bank industry in western Europe before the arrival of the Internet. It documents the presence of a pan-European network of IT users and analyzes the role of their industry associations in the processes of adopting and disseminating technology. It describes and analyzes their situation as late technology users, indicating certain specific and original patterns in the adoption of computers. Special attention is given to the implementation of shared computer centers throughout Europe and the results in the area of online accounting systems and teleprocessing systems as steps before the development of savings bank electronic funds transfer networks. It documents that in the savings banks industry, a reciprocal influence between technology and its uses was in play over long period of time and throughout the technological changes.


Author(s):  
Robert L. Kane ◽  
Thomas D. Parsons

The word disruptive has become associated with the age of technology. The connotations of this term have changed drastically from years ago, when in schools it was associated with the type of behavior that would result in a trip to the principal’s office. In the 21st century, “disruptive” often refers to changes that markedly affect and reshape the way things are done, opening up new approaches that change the way we live and function. Computers in various forms, from desktop systems to handheld devices and mobile phones, have played a large role in changing the way we live and work. Researchers no longer spend days at computer centers running study statistics and now can accomplish far more sophisticated analyses using notebook computers. Despite the dramatic changes technology has made in most phases of life, its impact on the practice of clinical neuropsychology has been minimal. It is fair to say that neuropsychologists have increased their use of computers for patient assessment and that some traditional test measures have been adopted for computers, simplifying the administration and scoring process. A number of tests have been developed and designed for computer administration. While computer use has increased especially in specific areas, such as aviation, pharmaceutical studies, and in evaluating concussion both in sports and in the military, the potential use of computers and other technologies to augment assessment has barely been exploited. The goal of this volume is to present ideas and accomplished work demonstrating the use of technology to augment the neuropsychological assessment of patients. Some of the ideas presented in the introduction are forward thinking, incorporate the use of advanced technology, and are potentially disruptive. Others represent incremental changes, but changes that take obvious advantage of using technology to modernize and streamline the assessment process. The introduction reviews the current state of technology in neuropsychology and sets the stage for the succeeding chapters.


2017 ◽  
Vol 2 (5) ◽  
Author(s):  
Bory Daniel Chilán Intriago ◽  
Enrique Javier Macías Arias

Uno de los cambios más sorprendentes del mundo de hoy es la rapidez de las comunicaciones. Modernos sistemas permiten que el flujo de conocimientos sea independiente del lugar físico donde se encuentren. En ese sentido, ya no sorprende la transferencia de información en tiempo real o instantáneo  y debido a que el conocimiento es poder; para adquirirlo, las empresas  se han  unido  en  grandes  redes  internacionales  para transferir datos,  sonidos  e imágenes, y realizar el comercio en forma electrónica, con objeto de ser más eficientes. No obstante, al unirse en forma pública se han vuelto vulnerables, pues cada sistema de computadoras involucrado en la red es un blanco potencial y apetecible para obtener información. El objetivo de esta investigación fue dar a conocer los resultados obtenidos sobre los métodos para defensa contra virus informático. En este trabajo se concluyó que el avance de la tecnología tanto en software como en hardware, ha hecho que los antivirus hayan evolucionado hacia mejores programas que no solo buscan detectar virus informáticos si no bloquearlos y desinfectarlos. Para el desarrollo de esta experiencia  se realizaron encuestas a 69 Ingenieros en Sistemas y Administradores de centros de cómputo de la ciudad de Portoviejo, Ecuador. Se concluyó que La mayoría de usuarios adquieren los programas de antivirus  mediante  descargas  de  la  web,  o  compra  de  programas  piratas,  los  cuales  no protegen totalmente al computador y en vez de volverse una ayuda se convierte en amenazas.  Palabras   claves:   antivirus,   desinfectarlos,   vulnerables,   virus   informáticos,   software, hardware, centros de cómputo  Study of methodologies for defense against computer viruses that can damage computer equipment.   Abstract One of the most striking changes in the world today is the speed of communication. Modern systems allow the flow of knowledge is independent of the physical location where they are. In that sense, no longer surprises transfer or instant real- time and because knowledge is power ; to acquire , companies have joined in large international networks to transfer data, sound and images, and make trade electronically in order to be more efficient. However, joining publicly have become vulnerable, as each computer system involved in the network is a potential target and appealing for information. The objective of this research was to present the results on methods of defense against computer viruses. This paper concluded that the advancement  of technology both  in  software and  hardware,  has  made  the best  antivirus programs have evolved to not only seek to detect viruses if no block and disinfection. For the development of this experience surveys to 69Ingenieros Systems and datacenter managers of Portoviejo, Ecuador ciudadde. It was concluded that most users purchase antivirus programs via web downloads, or buying pirated programs, which do not fully protect the computer and instead of becoming an aid becomes threats. Keywords: antivirus, disinfect, vulnerable, computer virus, software, hardware, computer centers


2015 ◽  
Vol 13 (34) ◽  
pp. 83-106
Author(s):  
Carlos Andrés Martínez Alayón ◽  
Roberto Ferro Escobar ◽  
Víctor José Arrieta Zambrano

This document aims to contextualize the reader about some of the mechanisms that currently exist for IPv4-IPv6 transition and evidence some aspects that must be taken into account when evaluating and implementing some of them, specifically in centers of high performance computing and academic networks to support research projects. It also aims to show the implementation and support of IPv6 in e-learning technology platforms.


2015 ◽  
pp. 1780-1797
Author(s):  
Manuel Pérez-Cota ◽  
Ramiro Gonçalves ◽  
Fernando Moreira

Money is one of the most important things for enterprises today. Computer Centers represent a large part of the total costs of enterprises, irrespective of their size. This chapter describes some (real) ways to convince enterprises to use Cloud computing in order to save money and obtain better returns from their computer (hard and soft) resources.


Author(s):  
Subrata Dasgupta

In 1962, purdue University in West Lafayette, Indiana, in the United States opened a department of computer science with the mandate to offer master’s and doctoral degrees in computer science. Two years later, the University of Manchester in England and the University of Toronto in Canada also established departments of computer science. These were the first universities in America, Britain, and Canada, respectively, to recognize a new academic reality formally—that there was a distinct discipline with a domain that was the computer and the phenomenon of automatic computation. There after, by the late 1960s—much as universities had sprung up all over Europe during the 12th and 13th centuries after the founding of the University of Bologna (circa 1150) and the University of Paris (circa 1200)—independent departments of computer science sprouted across the academic maps on North America, Britain, and Europe. Not all the departments used computer science in their names; some preferred computing, some computing science, some computation. In Europe non-English terms such as informatique and informatik were used. But what was recognized was that the time had come to wean the phenomenon of computing away from mathematics and electrical engineering, the two most common academic “parents” of the field; and also from computer centers, which were in the business of offering computing services to university communities. A scientific identity of its very own was thus established. Practitioners of the field could call themselves computer scientists. This identity was shaped around a paradigm. As we have seen, the epicenter of this paradigm was the concept of the stored-program computer as theorized originally in von Neumann’s EDVAC report of 1945 and realized physically in 1949 by the EDSAC and the Manchester Mark I machines (see Chapter 8 ). We have also seen the directions in which this paradigm radiated out in the next decade. Most prominent among the refinements were the emergence of the historically and utterly original, Janus-faced, liminal artifacts called computer programs, and the languages—themselves abstract artifacts—invented to describe and communicate programs to both computers and other human beings.


Author(s):  
Manuel Pérez-Cota ◽  
Ramiro Gonçalves ◽  
Fernando Joaquim Lopes Moreira

Money is one of the most important things for enterprises today. Computer Centers represent a large part of the total costs of enterprises, irrespective of their size. This chapter describes some (real) ways to convince enterprises to use Cloud computing in order to save money and obtain better returns from their computer (hard and soft) resources.


Sign in / Sign up

Export Citation Format

Share Document