The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Methods of expert assessment are considered. Key problems of expert evaluating are listed. Model of automatic expert system is introduced. Method of aggregation of heterogeneous expert assessment is proposed.
Chaos Engineering is a discipline emerging from the practitioner community around experimenting on a distributed system in order to build confidence in the system’s capability to withstand turbulent conditions in production. This panel will bring together practitioners from a range of technology companies to discuss how they are running experiments on production systems in order to improve reliability.
Cloud computing is an emerging technology that over the internet provides services such as computing infrastructure, network services, applications, business processes, etc. The biggest concern is the security in the cloud computing. Since many solutions provided to secure cloud but since have identified cloud security requirements sporadically and confine could not improve cloud security problems...
Rapid deployment of e-governance applications emphasis on need for security and authentication. Many emerging technologies are being developed to fulfil security requirements. The major concern in e-governance transactions is the need for replacement of hand-written signature with an ‘online’ signature. Further, since web enabled applications are prone to various types of security breaches, the discussion...
Today, in every organization are generated in large volume of data in electronic format that required the safety storage services. Data backup and Disaster Recovery / Business Continuity issues are becoming fundamental in networks since the importance and societal value of digital data is continuously increasing. Every organization requires a business continuity plan (BCP) or disaster recovery plan...
Synchronous e-training is emerging as an alternative for developing human resources training plans in large organizations. However, synchronous e-training platforms must face many issues affecting their resilience. Self-recovering and self-protection software techniques should be implemented to enable the continuity of e-training activities faced with network failures or entities of the platform going...
Though a variety of cloud storage services have been offered recently, they have not yet provided users with transparent and cost-effective personal data storage. Services like Google Docs offer easy file access and sharing, but tie storage with internal data formats and specific applications. Meanwhile, services like Drop box offer general-purpose storage. Yet they have not been widely utilized,...
In most of companies or organizations, logs play important role in information security. However, the common security mechanism only backup logs, it is not able to find out traces of intruders because the hacker who is able to intrudes the security mechanism of organization would try to alter logs or destroy important intrusion evidences making it impossible to preserve evidence using traditional...
The growing number of PKIs (Public Key Infrastructure) and the increasing number of situations where partners of a transaction may carry certificates signed by different CAs (Certification Authority) point out the problematic of trust between the different CAs. The degree to which a relying party can trust a CA depends upon the quality of its announced policy and its commitment to this policy. In...
With the growing scale of storage systems, the single and static data organization strategies cannot satisfy the increasing demand of high performance and reliable I/O. One solution is to adjust data organization manually by administrators periodically, which causes high labor cost. This paper presents a dynamic data organization in mass storage systems based on an attribute-managed approach. The...
In high performance computing environment, the metadata servers of distributed file system become critical to impact overall system performance. An approach of memory based metadata server is proposed, instead of the disk based approach. We present a metadata management system with matrix organization, non-overhead reliable mechanism and static scalability method, which is design to efficiently utilize...
During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technologies have been deployed for emergency response; however communication between different first response organizations has always been a problem. This is due to either broken networks or lack of knowledge regarding the channel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.