- Full text PDF available (8)
Distributed processing has provided a number of advantages to network designers. These service advantages include better performance, backup and availability potential. This paper uses simulation to predict network performance of three host models: single host, dual hosts and dual hosts with mirrored file systems. The results indicate that the dual models… (More)
The advent of distributed processing and global information systems has driven the need for fast, efficient and secure global authentication systems. Typically distributed processing implies that any given application will require computing resources from multiple computing nodes, and hence for the sake of convenience will require single sign-on capability… (More)
In an organization, a well devised disaster recovery plan is not only crucial in the information recovery process, but also vital in the quest to sustain daily operations. While prior research has discussed many recovery sites options, assessment of recovery site communication paths and their associated complexity is still limited in regard to the… (More)
Information Technology (IT) has enabled enormous transformations in the value chains and strategies of firms in a wide variety of industries, forcing IT adoption in companies slow to react. Higher education is at a crossroads of adoption of IT facilitated online education, which could have a dramatic impact on the competitive environment for colleges and… (More)
The paper provides an overview of three common virtualization threats that have been observed in log files in the authors' network and suggests solutions to mitigate those security vulnerabilities. The solutions offered have been implemented on a network with over 200 hosts 40 of which are virtualized.
Data mining and very large databases offer a great deal of promise for business and government alike. Unfortunately, due to the ever changing data needs of the modern organization, as evidenced by the growing number of petabyte data applications, the task to efficiently extract data in a timely manner becomes more difficult. The research described herein… (More)