3 resultados para Identificação remota de sistemas operacionais

em Repositório Institucional da Universidade Tecnológica Federal do Paraná (RIUT)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The growing demand for large-scale virtualization environments, such as the ones used in cloud computing, has led to a need for efficient management of computing resources. RAM memory is the one of the most required resources in these environments, and is usually the main factor limiting the number of virtual machines that can run on the physical host. Recently, hypervisors have brought mechanisms for transparent memory sharing between virtual machines in order to reduce the total demand for system memory. These mechanisms “merge” similar pages detected in multiple virtual machines into the same physical memory, using a copy-on-write mechanism in a manner that is transparent to the guest systems. The objective of this study is to present an overview of these mechanisms and also evaluate their performance and effectiveness. The results of two popular hypervisors (VMware and KVM) using different guest operating systems (Linux and Windows) and different workloads (synthetic and real) are presented herein. The results show significant performance differences between hypervisors according to the guest system workloads and execution time.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This document presents GEmSysC, an unified cryptographic API for embedded systems. Software layers implementing this API can be built over existing libraries, allowing embedded software to access cryptographic functions in a consistent way that does not depend on the underlying library. The API complies to good practices for API design and good practices for embedded software development and took its inspiration from other cryptographic libraries and standards. The main inspiration for creating GEmSysC was the CMSIS-RTOS standard, which defines an unified API for embedded software in an implementation-independent way, but targets operating systems instead of cryptographic functions. GEmSysC is made of a generic core and attachable modules, one for each cryptographic algorithm. This document contains the specification of the core of GEmSysC and three of its modules: AES, RSA and SHA-256. GEmSysC was built targeting embedded systems, but this does not restrict its use only in such systems – after all, embedded systems are just very limited computing devices. As a proof of concept, two implementations of GEmSysC were made. One of them was built over wolfSSL, which is an open source library for embedded systems. The other was built over OpenSSL, which is open source and a de facto standard. Unlike wolfSSL, OpenSSL does not specifically target embedded systems. The implementation built over wolfSSL was evaluated in a Cortex- M3 processor with no operating system while the implementation built over OpenSSL was evaluated on a personal computer with Windows 10 operating system. This document displays test results showing GEmSysC to be simpler than other libraries in some aspects. These results have shown that both implementations incur in little overhead in computation time compared to the cryptographic libraries themselves. The overhead of the implementation has been measured for each cryptographic algorithm and is between around 0% and 0.17% for the implementation over wolfSSL and between 0.03% and 1.40% for the one over OpenSSL. This document also presents the memory costs for each implementation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Universities are institutions that generate and manipulate large amounts of data as a result of the multiple functions they perform, of the amount of involved professionals and students they attend. Information gathered from these data is used, for example, for operational activities and to support decision-making by managers. To assist managers in accomplishing their tasks, the Information Systems (IS) are presented as tools that offer features aiming to improve the performance of its users, assist with routine tasks and provide support to decision-making. The purpose of this research is to evaluate the influence of the users features and of the task in the success of IS. The study is of a descriptive-exploratory nature, therefore, the constructs used to define the conceptual model of the research are known and previously validated. However, individual features of users and of the task are IS success antecedents. In order to test the influence of these antecedents, it was developed a decision support IS that uses the Multicriteria Decision Aid Constructivist (MCDA-C) methodology with the participation and involvement of users. The sample consisted of managers and former managers of UTFPR Campus Pato Branco who work or have worked in teaching activities, research, extension and management. For data collection an experiment was conducted in the computer lab of the Campus Pato Branco in order to verify the hypotheses of the research. The experiment consisted of performing a distribution task of teaching positions between the academic departments using the IS developed. The task involved decision-making related to management activities. The data that fed the system used were real, from the Campus itself. A questionnaire was answered by the participants of the experiment in order to obtain data to verify the research hypotheses. The results obtained from the data analysis partially confirmed the influence of the individual features in IS success and fully confirmed the influence of task features. The data collected failed to support significant ratio between the individual features and the individual impact. For many of the participants the first contact with the IS was during the experiment, which indicates the lack of experience with the system. Regarding the success of IS, the data revealed that there is no significance in the relationship between Information Quality (IQ) and Individual Impact (II). It is noteworthy that the IS used in the experiment is to support decision-making and the information provided by this system are strictly quantitative, which may have caused some conflict in the analysis of the criteria involved in the decision-making process. This is because the criteria of teaching, research, extension and management are interconnected such that one reflects on another. Thus, the opinion of the managers does not depend exclusively on quantitative data, but also of knowledge and value judgment that each manager has about the problem to be solved.