Spelling suggestions: "subject:"'cloud computing'"" "subject:"'aloud computing'""
151 |
Virtualisation efficace d'architectures NUMA / Efficient virtualization of NUMA architecturesVoron, Gauthier 08 March 2018 (has links)
Alors que le surcoût de la virtualisation reste marginal sur des machines peu puissantes, la situation change radicalement quand le nombre de cœur disponible augmente. Il existe aujourd’hui des machines de plusieurs dizaines de cœurs dans les data centers dédiés au cloud computing, un modèle de gestion de ressources qui utilise largement la virtualisation. Ces machines reposent sur une architecture Non Uniform Memory Access (NUMA) pour laquelle le placement des tâches sur les cœurs ainsi que celui des données en mémoire est déterminant pour les performances.Cette thèse montre d’une part comment la virtualisation affecte le comportement des applications en les empêchant notamment d’utiliser un placement efficace de leurs données en mémoire. Cette étude montre que les erreurs de placement ainsi provoquées engendrent une dégradation des performances allant jusqu’à 700%. D’autre part, cette thèse propose une méthode qui permet la virtualisation efficace d’architectures NUMA par la mise en œuvre dans l’hyperviseur Xen de politiques génériques de placement mémoire. Une évaluation sur un ensemble de 29 applications exécutées sur une machine NUMA de 48 cœurs montre que ces politiques multiplient les performances de 9 de ces applications par 2 ou plus et diminuent le surcoût de la virtualisation à moins de 50% pour 23 d’entre elles. / While virtualization only introduces a negligible overhead on machines with few cores, this is not the case when the number of cores increases. We can find such computers with tens of cores in todays data centers dedicated to the cloud computing, a resource management model which relies on virtualization. These large multicore machines have a complex architecture, called Non Uniform Memory Access (NUMA). Achieving high performance on a NUMA architecture requires to wisely place application threads on the appropriate cores and application data in the appropriate memory bank.In this thesis, we show how virtualization techniques modify the applications behavior by preventing them to efficiently place their data in memory. We show that the data misplacement leads to a serious performance degradation, up to 700%.Additionally, we suggest a method which allows the Xen hypervisor to efficiently virtualize NUMA architectures by implementing a set of generic memory placement policies. With an evaluation over a set of 29 applications on a 48-cores machine, we show that the NUMA policies can multiply the performance of 9 applications by more than 2 and decrease the virtualization overhead below 50% for 23 of them.
|
152 |
Application of cloud computing in South African libraries : a case study of Polokwane Municipal LibrariesMolaudzi, Amogelang Isaac January 2020 (has links)
Thesis (M.A. (Information Studies)) -- University of Limpopo, 2020 / International, national and local public and private sectors are shifting into Cloud
Computing (CC). This paradigm shift is fuelled by technological and transformational
changes of CC in every sector, including libraries. Presently in South Africa, some
libraries still operate on the traditional ICT based desktop applications, whereas some
hardly notice that CC is part of their daily activities such as carrying out transactions
in the cloud services like emailing on Gmail. There is a major gap in terms of adopting
and understanding CC technology in public libraries.
Hence the study proposed to describe and explore the application and understanding
of CC in Polokwane Municipal libraries. The study identified CC tools used by
librarians and determined the level of librarians’ knowledge and understanding of CC.
The study further measured perceptions of librarians towards CC and established
factors influencing the use of CC in libraries.
The researcher used a mixed-methods research approach and case study research
design, located within postpositivism and interpretivism paradigm. The study was a
census in nature because of the small population. Data was collected using
questionnaire and interviews from 30 respondents who were librarians and
participants who were library managers. Collected data were analysed through
descriptive statistics and thematic data analysis.
Findings from the study reveal that librarians are not fully using CC but use some of
the CC applications such as google scholar, without having detailed knowledge and
understanding. The study further found out that Polokwane Municipal libraries fail to
adopt CC as a result of limited budget and poor internet connection. The study
recommends intensive study on factors influencing adoption of CC, workshops and
training for librarians, and initiatives on fundraising within these libraries.
|
153 |
Der Einfluss von Cloud-Computing auf die Sicherheit im StraßenverkehrAugele, Vivian 28 July 2023 (has links)
Jährlich sterben weltweit 1,35 Millionen Menschen durch Verkehrsunfälle. Ob Cloud-Computing zu einer Reduzierung dieser Zahl beitragen wird, wird in der vorliegenden Arbeit untersucht. Zunächst werden Cloud-Anwendungen ermittelt, welche im Straßenverkehr verwendet werden und Einfluss auf die Straßenverkehrssicherheit haben. Anschließend wird deren genauer Einfluss auf die Straßenverkehrssicherheit durch die Betrachtung von Stu-dienergebnissen, Herstellerangaben sowie eigenen Kalkulationen untersucht. Zudem werden die Gefahren von Cyberangriffen und Netzausfällen für die ermittelten Anwendungen analysiert. Es folgt eine kritische Diskussion sowie die Zusammenfassung des Erarbeiteten: Cloud-Computing ermöglicht durch den einfachen, risikoarmen Zugang zu unlimitierten Rechenressourcen die Entwicklung und den Betrieb von Anwendungen, die Einfluss auf die Verkehrssicherheit nehmen. Es ist davon auszugehen, dass die Anwendungen bei einer weiter voranschreitenden Felddurchdringungsrate positiven Einfluss auf die Straßenverkehrssicherheit in Deutschland und anderen Industriestaaten nehmen und damit aktiv zur Reduzierung der Anzahl Verkehrstoter und -verletzter beitragen werden. Cloud-Computing wird somit ein indirekt positiver Einfluss auf die Straßenverkehrssicherheit zugeschrieben. / 1.35 million people die in traffic accidents worldwide every year. Whether cloud computing contributes to a reduction of this number is examined in the present work. First, cloud com-puting applications are identified, which are used in road traffic and have an impact on traffic safety. The exact influence on traffic safety is then examined by considering study results, manufacturer information and through own calculations. In addition, the dangers of cyber-attacks and network failures are examined in the context of the identified applications. This is followed by a critical discussion and a summary of what has been worked out: Cloud computing enables the development and operation of applications that affect traffic safety through simple, low-risk access to unlimited computing resources. It can be assumed that the applica-tions will have a positive influence on traffic safety in Germany and other industrialized countries and will thus actively contribute to reducing the number of deaths and injuries, given that the penetration rate is further increasing. Cloud computing is thus attributed an indirect positive influence on road safety.
|
154 |
Determinants of Cloud Computing Adoption in Large Companies in SwedenGüldogan, Seher, Sun, Ruo Lin January 2023 (has links)
Cloud computing has gained popularity due to its ability to simplify IT infrastructure, reduce costs, and provide remote access. Among EU countries and company sizes, Sweden stands out with the highest rate of cloud computing adoption. However, there is a lack of concrete research in the literature focusing on the determinants of cloud computing adoption specifically by large companies in Sweden. Previous studies have examined cloud adoption from various perspectives, with a particular emphasis on small and medium-sized enterprises (SMEs) rather than large companies. Additionally, technology-related determinants have received more attention compared to those related to business, conceptualization, and application domains. To address this knowledge gap, this research aims to investigate the determinants of CC adoption in large companies in Sweden. The research question was formulated as follows: What are the determinants of cloud computing adoption in large companies in Sweden? Case study was selected as the research strategy, and the data was collected through semi-structured interviews and analyzed through thematic analysis. Semi-structured interviews were conducted with employees working at a large company in Sweden, who have experience in the IT and cloud computing field. The TOE framework was used to categorize the determinants as sub-themes into three themes: technology context, organization context, and environment context. In Company X, 30 determinants were found, with 20 aligning with previous literature. These included factors such as security, compatibility, scalability, top management support, and competitive pressure. Additionally, 10 new determinants were identified, including robustness, perceived usefulness, innovativeness, knowledge and training, and geographical locations/data centers. The experience and lessons learned from Company X could assist other companies to have better preparation for cloud adoption by understanding the significance of various potential determinants and underlying problems.
|
155 |
TOWARDS MANY-CORE PROCESSOR SIMULATION ON CLOUD COMPUTING PLATFORMSSchmidt, James Michael 23 August 2011 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Growth of interest and need for many-core systems have steadily increased over the recent years. Industry trends lead many-core systems to become increasingly larger and more complex. Because of these realities it is important to researchers, academia, and industry that the design of these many-core systems be straightforward and comprehensive. There is a need for a many-core simulator that can be simple to use and learn from for students, dynamic and capable of emulating large systems for researchers, and flexible with fast turnover for industry designers. At the same time, as many-core systems have been becoming popular and complex, and hence their design, the long standing field of Cloud Computing has become more prevalent and feasible to use. Such cloud computing platforms as Windows Azure allow for the easy access and use of resources that in the past were simply not available to ordinary users. Large tasks can be performed in SaaS Cloud Computing models and be accessible from a small, lightweight device using nothing more than a web browser. As a solution to the needs for designing future many-core systems, we present a Many-Core Simulator on Azure Cloud Computing Platform called M3C Simulator. This is targeted at teaching, research, and industry and as such needs to be easy to use, flexible, and powerful. The Could Computing service model meets all these needs. This thesis discusses overall design of the M3C Simulator and how it leverages Cloud Computing resources, the simple-to-use and understand Interface layout, and the software design including program flow and dynamic compilation.
|
156 |
The design, development and evaluation of a holistic cloud migration decision frameworkMushi, Tumelo Nicholas January 2020 (has links)
No keywords provided in dissertation / Cloud Computing has gained traction since its emergence and client organisations that want to benefit from the Cloud are looking for ways to migrate their on-premise applications to the Cloud. To assist client organisations with migration projects, researchers and practitioners
have proposed various Cloud migration approaches. However, these approaches differ in applicability depending on the type of application being migrated and the Cloud Service Provider where the application is being migrated to. The various approaches to Cloud migration create complexity in Cloud migration decisions as client organisations have to
consider various approaches depending on the migration project. The purpose of this dissertation is to create a universal Cloud migration approach that can be applied to every Cloud migration project. In this dissertation, a cloud migration decision framework is proposed; namely, A Holistic Cloud Migration Decision Framework (HCMDF). The research strategy that was followed is Design Science Research (DSR) and was selected since the output of the research is going to be an Information Technology (IT) research artefact. By applying the DSR strategy, the HCMDF was successfully developed and evaluated in the real world using an adaptive case study. The analysis of the results indicated that the HCMDF solves Cloud migration problem and that it can be applied to every Cloud migration project.
Throughout the evaluation, areas of improvement were identified and these will be considered in future research. / School of Computing / M. Tech (Information Technology)
|
157 |
Analyzing the Effects of Virtualization on Cloud Platform PerformanceKaya, Gaylord January 2024 (has links)
Denna avhandling utforskar den komplexa interaktionen mellan virtualiseringstekniker och prestanda för molnapplikationer. Genom att utvärdera hypervisor- och containerbaserade metoder skapar vi en teoretisk grund för att förstå rollen för virtualisering i modern molnbaserad miljö. Genom en metodisk förstudie och implementeringen av virtuella instanser samlar vi omfattande data om CPU-användning, nätverkstrafik, lagring och genomströmning, vilket avslöjar viktiga insikter. Resursanvändningen påverkas framför allt av hur databelastning ser ut, där resursintensiva uppgifter påverkar både hypervisor och containerinstanser. Studien visar att valet mellan hypervisor och containerteknik kan bero vissa användningsfall, vilket kräver ytterligare optimering. Att isolera tekniker på separata EC2- instanser ger bra kontroll men kräver löpande justeringar för varierande prestandamätningar. Slutsatserna hjälper till att förstå virtualiserings inverkan på molnapplikationer och betonar de avgörande rollerna för lagringshantering, nätverksdynamik och databelastning. Den här avhandlingen tar inte bara upp viktiga frågor, utan den lägger också grunden för framtida forskning som förutser förbättrad effektivitet och prestanda i virtualiserade molnmiljö. / This thesis explores the complex interaction between virtualization technologies and cloud application performance. By evaluating hypervisor and container-based approaches, we establish a theoretical foundation for understanding virtualization's role in modern cloud computing. Through a methodical pre-study and the implementation of virtual instances, we gather extensive data on CPU utilisation, network traffic, storage, and throughput to reveal key insights. Workloads notably impact resource usage, with resource-intensive tasks affecting both hypervisor and container instances. The study suggests that the choice between hypervisor and container technologies may depend on certain use cases, prompting further optimization. Isolating technologies on separate EC2 instances provides control but demands ongoing refinement for varied performance metrics. Conclusions contribute to understanding virtualization's impact on cloud applications, emphasising the critical roles of workload, network dynamics, and storage management. This thesis not only addresses key questions but also sets the stage for future explorations, promising enhanced performance and efficiency in virtualized cloud environments.
|
158 |
Modelling and Evaluation of Performance, Security and Database Management Trade-offs in Cloud Computing Platforms. An investigation into quantitative modelling and simulation analysis of ‘optimal’ performance, security and database management trade-offs in Cloud Computing Platforms (CCPs), based on Stochastic Activity Networks (SANs) and a three-tier combined metricsAkinyemi, Akinwale A. January 2020 (has links)
A framework for the quantitative analysis of performance, security and database
management within a network system (e.g. a cloud computing platform) is presented
within this research. Our study provides a methodology for modelling and
quantitatively generating significant metrics needed in the evaluation of a network
system. To narrow this research, a study is carried-out into the quantitative modelling
and analysis of performance, security and database management trade-offs in cloud
computing platforms, based on Stochastic Activity Networks (SANs) and combined
metrics.
Cloud computing is an innovative distributed computing archetypal based on the
infrastructure of the internet providing computational power, application, storage and
infrastructure services. Security mechanisms such as: batch rekeying, intrusion
detection, encryption/decryption or security protocols come at the expense of
performance and computing resources consumption. Furthermore, database
management processing also has an adverse effect on performance especially in the
presence of big data. Stochastic Activity Networks (SANs) that offer synchronisation, timeliness and parallelism are proposed for the modelling and quantitative evaluations
of ‘optimal’ trade-offs involving performance, security and database management.
Performance modelling and analysis of computer network systems has mostly been
considered of utmost importance. Quantification of performance for a while has been
assessed using stochastic models with a rising interest in the quantification of security
stochastic modelling being applied to security problems. Quantitative techniques that
includes analytical valuations founded on queuing theory, discrete-event simulations
and correlated approximations have been utilised in the examination of performance.
Security suffers from the point that no interpretations can be made in an optimal case.
The most consequential security metrics are in analogy with reliability metrics.
The express rate at which data grows increases the prominence for research into the
design and development of cloud computing models that manages the workload
intensity and are suitable for data exploration. Handling big data especially within
cloud computing is a resource consuming, time-demanding and challenging task that
necessitates titanic computational infrastructures to endorse successful data
exploration. We present an improved Security State Transition Diagram (SSTD) by adding a new
security state (Failed/Freeze state). The presence of this new security state signifies a
security position of the computing network system were the implemented security
countermeasures cannot handle the security attacks and the system fails completely.
In a more sophisticated security system, when the security countermeasure(s) cannot
in any form categorise the security attack, the network system is moved to the
Failed/Freeze security state. At this security state, the network system can only resume
operation when restored by the system administrator.
In this study, we propose a cloud computing system model, defined security
countermeasures and evaluated the optimisation problems for the trade-offs between
performance, security and database management using SANs formalism. We
designed, modelled and implemented dependency within our presented security
system, developing interaction within the security countermeasures using our
proposed Security Group Communication System (SGCS). The choice of Petri-Nets enables the understanding and capturing of specified metrics at different stages of the
proposed cloud computing model.
In this thesis, an overview of cloud computing including its classification and services
is presented in conjunction with a review of existing works of literature. Subsequently,
a methodology is proposed for the quantitative analysis of our proposed cloud
computing model of performance-security-database trade-offs using Möbius
simulator. Additionally, numerical experiments with relevant interpretations are
presented and appropriate interpretations are made. We identified that there are system
parameters that can be used to optimise the presented abstract combined metrics but
they are optimal for neither performance or security or database management
independently. Founded on the proposed quantitative simulation model framework,
reliable numerical experiments were observed and indicated scope for further
extensions of this work. For example, the use of Machine Learning (ML) or Artificial
Intelligence (AI) in the predictive and prevention aspects of the security systems.
|
159 |
On Information Security Processes in Cloud ComputingMahmoud, Suzan January 2013 (has links)
Cloud computing allows user access to virtual services (applications, servers and devices, digital storage and service packages sources) through a network using a web browser. Cloud computing is rapidly growing and has become an attractive and affordable service model among organizations. It has many benefits but is also associated with many risks and security challenges. In cloud computing users can connect with any device and use virtual computing services at any time and from anywhere, which has brought new challenges for enterprise security. The problem of securing data in the cloud and building trust in the cloud computing environment has become a widely discussed and important issue.This research aims to investigate how enterprises deal with security problems and protect their data in the cloud through security measures and processes. It also investigates what processes could be adapted to the security environment. To achieve this, an empirical study was performed. The empirical study consisted of interviews with a number of enterprises that use cloud computing in their business, with the purpose to give a deep picture of how they handle security issues related to their cloud services.During the empirical study it could be found differences and similarities in the security measures used by the different organizations, depending on the size of the organization and the type of services used or provided by the organizations. Information security should be managed in a series of processes or procedures, linked together in an environment such as the Information security management system (ISMS). On the basis of the evaluation of the interviews and literature, a cloud environment with different security processes is defined.
|
160 |
Transformation of organizations through cloud technologies – challenges & benefits. A case study in Rwanda. / Transformation av organisationer med hjälp av molnteknologi - utmaningar och fördelar. En fallstudie i Rwanda.Twagiramungu, Jean Robert January 2022 (has links)
From start-ups and small businesses to enterprises, cloud computing significantly impacts their operations. Many studies and research projects on cloud computing have been carried out to assess the impact of how organizations deliver IT services. This study has been conducted in organizations in Rwanda, one of the fastest-growing African countries in the ICT sector, which is turning the nation into a knowledge-based economy. Cloud computing provides several advantages to organizations, and the future also seems promising. However, organizations face several risks and challenges in using this technology. Therefore, they must be aware of challenges when migrating the workload to the cloud. This may alleviate not only the challenges but also create a graceful transition to the cloud. Therefore, this study will measure the perceptions of the challenges and benefits of using cloud computing technology in organizations in Rwanda. As the study shows, the major challenge organizations face is a shortage of cloud experts in the industry. The study revealed that migration is complex and risky, data security and privacy are concerns, and a high-speed internet connection is required and costly. The benefits include: minimizing IT costs with a pay-as-you-go model, better performance and speed, flexibility and scalability as the needs change, collaboration, and communication in the organization. It was concluded that, as cloud computing technology is a new concept to organizations, challenges in its implementation may occur. To help Rwanda's ICT sector grow, policymakers, organization managers, and executives should develop a comprehensive solution policy to address these challenges.
|
Page generated in 0.0537 seconds