network storage
Recently Published Documents


TOTAL DOCUMENTS

188
(FIVE YEARS 28)

H-INDEX

13
(FIVE YEARS 3)

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Qingbo Yan

The video management system in colleges and universities has become one of the most important platforms for video communication. In order to improve the storage and sharing of teaching video resource system in colleges and universities, this paper designs a teaching video resource management system based on micro grid technology. Through the construction of microtechnology + NAS network storage, the video network storage is realized, and the network sharing efficiency is improved. In addition, ASP.NET is used to develop video release and on-demand module, to meet the needs of users; through a variety of terminals in the presentation layer to display the relevant content, the design of video resource management system in line with the teaching needs of colleges and universities is completed. The experimental results show that the image processed by the system is smooth and delicate, the tone is realistic, and the system has good storage performance and high sharing efficiency.


2021 ◽  
Vol 48 (3) ◽  
pp. 113-119
Author(s):  
Behnam Pourghassemi ◽  
Ardalan Amiri Sani ◽  
Aparna Chandramowlishwaran

Causal profiling is a novel and powerful profiling technique that quantifies the potential impact of optimizing a code segment on the program runtime. A key application of causal profiling is to analyze what-if scenarios which typically require a large number of experiments. Besides, the execution of a program highly depends on the underlying machine resources, e.g., CPU, network, storage, so profiling results on one device does not translate directly to another. This is a major bottleneck in our ability to perform scalable performance analysis and greatly limits cross-platform software development. In this paper, we address the above challenges by leveraging a unique property of causal profiling: only relative performance of different resources affects the result of causal profiling, not their absolute performance. We first analytically model and prove causal profiling, the missing piece in the seminal paper. Then, we assert the necessary condition to achieve virtual causal profiling on a secondary device. Building upon the theory, we design VCoz, a virtual causal profiler that enables profiling applications on target devices using measurements on the host device. We implement a prototype of VCoz by tuning multiple hardware components to preserve the relative execution speeds of code segments. Our experiments on benchmarks that stress different system resources demonstrate that VCoz can generate causal profiling reports of Nexus 6P (an ARM-based device) on a host MacBook (x86 architecture) with less than 16% variance.


2021 ◽  
Vol 51 (1) ◽  
pp. 32-38
Author(s):  
Nikolaos Laoutaris ◽  
Costas Iordanou

What if instead of having to implement controversial user tracking techniques, Internet advertising & marketing companies asked explicitly to be granted access to user data by name and category, such as Alice→Mobility→05-11-2020? The technology for implementing this already exists, and is none other than the Information Centric Networks (ICN), developed for over a decade in the framework of Next Generation Internet (NGI) initiatives. Beyond named access to personal data, ICN's in-network storage capability can be used as a substrate for retrieving aggregated, anonymized data, or even for executing complex analytics within the network, with no personal data leaking outside. In this opinion article we discuss how ICNs combined with trusted execution environments and digital watermarking, can be combined to build a personal data overlay inter-network in which users will be able to control who gets access to their personal data, know where each copy of said data is, negotiate payments in exchange for data, and even claim ownership, and establish accountability for data leakages due to malfunctions or malice. Of course, coming up with concrete designs about how to achieve all the above will require a huge effort from a dedicated community willing to change how personal data are handled on the Internet. Our hope is that this opinion article can plant some initial seeds towards this direction.


2020 ◽  
Vol 6 (2) ◽  
pp. 17-34
Author(s):  
Jane Birkin

Abstract The traditional archive catalogue constitutes a form of structural and descriptive metadata that long precedes the internet; and the cataloguing of photographs is just one part of a process of archival administration. The application of keywords to images contrasts with archival prose description, which is based on the visual content of the image and is predominantly context-free; a remediation of the image itself. At the heart of this lies the notion that the single photograph is itself devoid of context; it is a discrete embodiment of shutter time and there is nothing certain either side of that. Thus, one can only speculate at its context, and institutional description techniques actively avoid such speculation. Yet context in the archive is ever-present and key to the function of images as objects of information and evidence. It is built through static relationships, through the situating of photographs in accordance with the concept of original order, and it is replicated through storage systems and hierarchical catalogue entries. Such orders, hierarchies and relationships are absent within sets of images that are brought together by keyword search, including through the websites of archival institutions that struggle to reconcile archival principles and identity with network culture. Images are transported to places where contextual information is at best difficult to access, especially for those unfamiliar with archival interfaces. In contrast to the controlled stasis of archival storage and interconnected recordkeeping systems, network storage is messy, unstable and poorly described. However, we must accept that context is not a prerequisite for many users, and for them the networking of archival images denotes a freedom; a democratisation of the archive. But in a media-driven society that is becoming more and more indifferent to the evidential value of documents of any kind, the context-free image is left predisposed to exploitation.


Sign in / Sign up

Export Citation Format

Share Document