Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 10848 dokumen yang sesuai dengan query
cover
Yuan, Dong.
Boston : Elsevier, 2013
004.678 2 YUA c
Buku Teks  Universitas Indonesia Library
cover
"Computation and storage in the cloud is the first comprehensive and systematic work investigating the issue of computation and storage trade-off in the cloud in order to reduce the overall application cost. Scientific applications are usually computation and data intensive, where complex computation tasks take a long time for execution and the generated datasets are often terabytes or petabytes in size. Storing valuable generated application datasets can save their regeneration cost when they are reused, not to mention the waiting time caused by regeneration. However, the large size of the scientific datasets is a big challenge for their storage. By proposing innovative concepts, theorems and algorithms, this book will help bring the cost down dramatically for both cloud users and service providers to run computation and data intensive scientific applications in the cloud. Covers cost models and benchmarking that explain the necessary tradeoffs for both cloud providers and users. Describes several novel strategies for storing application datasets in the cloud. Includes real-world case studies of scientific research applications."
Waltham, MA: Elsevier, 2013
e20426955
eBooks  Universitas Indonesia Library
cover
Ariq Pradipa Santoso
"Cloud Computing menyediakan akses mudah ke berbagai sumber daya melalui jaringan internet, dengan jangkauan jaringan yang luas, kemampuan elastisitas yang cepat, dan layanan yang dapat diukur. Dalam penelitian ini, digunakan Cloud Management Platform Apache CloudStack untuk membangun sistem Cloud sendiri. Sistem ini menggunakan sistem operasi Ubuntu dan hypervisor KVM (Kernel-based Virtual Machine) untuk menguji performa dan optimalisasi konfigurasi hypervisor dalam menjalankan tugas-tugas komputasi tertentu. Penelitian ini bertujuan untuk menganalisis apakah konfigurasi default dari hypervisor KVM sudah optimal dan bagaimana konfigurasi hypervisor KVM dapat meningkatkan performa dalam menjalankan tugas komputasi seperti kompresi video, enkripsi, dekripsi, dan validasi integritas data. Metode yang digunakan melibatkan pengujian performa hypervisor KVM dengan melakukan berbagai tugas komputasi dan mengukur waktu yang diperlukan untuk menyelesaikan tugas-tugas tersebut. Hasil pengujian menunjukkan bahwa konfigurasi hypervisor dengan menambahkan flag tertentu seperti SSSE3, SSE4.1, SSE4.2, SSE4a, dan AES dapat meningkatkan performa komputasi secara signifikan. Kesimpulan dari penelitian ini adalah bahwa konfigurasi default hypervisor KVM bersifat minimal dan perlu dilakukan konfigurasi untuk mencapai performa optimal. Konfigurasi hypervisor yang tepat dapat mempercepat kompresi video hingga 2.4 kali, validasi integritas data hingga 7.56 kali, enkripsi AES hingga 2.1 kali, dan dekripsi AES hingga 2.68 kali dibandingkan dengan konfigurasi default. Penelitian ini diharapkan memberikan kontribusi akademis dalam bidang optimalisasi infrastruktur cloud.

Cloud Computing provides easy access to various resources over the internet, with a wide network reach, fast elasticity capabilities, and measurable services. In this research, the Apache CloudStack Cloud Management Platform is utilized to build a Cloud system. This system uses the Ubuntu operating system and KVM (Kernel-based Virtual Machine) hypervisor to test performance and optimize the hypervisor configuration for specific computing tasks. The aim of this research is to analyze whether the default configuration of the KVM hypervisor is optimal and how configuration the KVM hypervisor can enhance performance in executing computing tasks such as video compression, encryption, decryption, and data integrity validation. The methodology involves performance testing of the KVM hypervisor by executing various computing tasks and measuring the time taken to complete these tasks. The test results indicate that configuring the hypervisor by adding specific flags such as SSSE3, SSE4.1, SSE4.2, SSE4a, and AES can significantly improve computational performance. The conclusion drawn from this research is that the default configuration of the KVM hypervisor is minimal and requires configuration to achieve optimal performance. Proper hypervisor configuration can accelerate video compression by up to 2.4 times, data integrity validation by up to 7.56 times, AES encryption by up to 2.1 times, and AES decryption by up to 2.68 times compared to the default configuration. This research is expected to make an academic contribution in the field of cloud infrastructure optimization."
Depok: Fakultas Teknik Universitas Indonesia, 2024
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Deshpande, Prachi S.
"This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented against such attacks. The performance of these IDS is verified in the Cloud scenario as well against the standard data set. Finally, a simple data storage and security model is developed and implemented for the Cloud computing scenario. The contents of this book will be of interest to researchers and professionals alike."
Singapore: Springer Nature, 2019
e20509833
eBooks  Universitas Indonesia Library
cover
Rizka Khairunnisa
"Cloud computing pada instansi pemerintah dapat membawa dampak positif bagi layanan publik pemerintah dan ekonomi regional. Cloud computing diharapkan menjadi solusi sistem TI yang efisisen dan ramah lingkungan dalam rangka mempercepat implementasi e-Government. Penggunaan teknologi cloud computing pada Badan Siber dan Sandi Negara BSSN yang memiliki kantor di beberapa lokasi diharapkan dapat meningkatkan efisiensi kinerja.
Beberapa unit kerja pada BSSN sudah menggunakan aplikasi cloud storage namun belum terintegrasi dan belum dipastikan apakah telah memenuhi standar keamanan BSSN. Di satu sisi, BSSN telah mengembangkan prototype aplikasi cloud storage yang aman sesuai standar keamanan BSSN. Oleh karena itu, perlu dirumuskan perencanaan strategi layanan cloud storage pada BSSN dengan menggunakan prototype aplikasi yang sudah ada agar terintegrasi dan terpenuhinya standar keamanan BSSN.
Penelitian ini melakukan perencanaan strategi dengan menggunakan tahap formulasi strategi pada kerangka manajemen strategis. Formulasi strategi terdiri atas audit eksternal, audit internal, analisis matriks EFE, analisis matriks EFE, analisis matriks IE, analisis SWOT, dan analisis QSPM.
Hasil dari analisis QSPM inilah yang menghasilkan rekomendasi prioritas strategi bagi BSSN dalam menerapkan cloud storage di lingkungan internalnya.Terdapat 5 lima alternatif strategi yang dihasilkan dari tahap-tahap pada formulasi strategi. Setelah dilakukan penilaian pada matriks QSPM dipilih 3 tiga alternatif strategi yang memiliki nilai total attaractiveness score TAS tertinggi. Ketiga alternatif strategi tersebut adalah melengkapi sumber daya TIK dan SDM secara bertahap, membuat grand design TIK, dan menyempurnakan prototype cloud storage.

Cloud computing at government institutions can have positive impacts on government public services and regional economies. Cloud computing is expected to be an efficient and eco friendly IT system solution in order to accelerate e Government implementation. The use of cloud computing technology in National Cyber and Crypto Agency NCCA , which has several offices, is expected to improve itself performance efficiency.
Some departments on NCCA are already using cloud storage applications but not yet integrated and have not been ascertained whether they meet NCCA security standards. On the one hand, NCCA has developed a secure prototype cloud storage application that complies with NCCA security standards. Therefore, it is necessary to formulate a cloud storage service strategy in NCCA using existing application prototype to integrate and fulfill BSSN security standard.
This research performs strategic planning using strategy formulation phase in strategic management framework. The strategy formulation consists of external audit, internal audit, EFE matrix analysis, EFE matrix analysis, IE matrix analysis, SWOT analysis, and QSPM analysis.
The results of QSPM analysis is strategic priority recommendations for NCCA in implementing cloud storage in its internal environment.There are 5 five alternative strategies generated from the stages in the strategy formulation. After the QSPM analysis, 3 three alternative strategies which have highest total attractiveness score TAS were selected. These three alternative strategies are equipping ICT and human resources gradually, creating a grand design of ICT, and improving cloud storage prototype.
"
Depok: Fakultas Teknik Universitas Indonesia, 2018
T51613
UI - Tesis Membership  Universitas Indonesia Library
cover
Smoot, Stephen R.
"Private cloud computing enables you to consolidate diverse enterprise systems into one that is cloud-based and can be accessed by end-users seamlessly, regardless of their location or changes in overall demand. Expert authors Steve Smoot and Nam K. Tan distill their years of networking experience to describe how to build enterprise networks to create a private cloud. With their techniques you?ll create cost-saving designs and increase the flexibility of your enterprise, while maintaining the security and control of an internal network. Private Cloud Computing offers a complete cloud architecture for enterprise networking by synthesizing WAN optimization, next-generation data centers, and virtualization in a network-friendly way, tying them together into a complete solution that can be progressively migrated to as time and resources permit."--pub. desc."
Waltham, MA : Morgan Kaufmann, 2012
004.678 2 SMO p
Buku Teks  Universitas Indonesia Library
cover
Leonardus Haryanto
"ABSTRAK
Networked station (Jaringan stasiun kerja) mutakhir pada umumnya memiliki ukuran memori yang relatif besar (8 - 32 Mbytes). Address space (Ruang alamat) yang sebesar itu amat mungkin tidak dimanfaatkan seluruhnya oleh pemakai pada setiap saat. Ada ruang alamat yang tersisa seyogyanya dapat dimanfaatkan untuk maksud-maksud lain.
Untuk workstation (stasiun kerja) yang idle (tidak digunakan) praktis ruang alamat tidak terpakai dan dapat digunakan. Dengan menggunakan protokol TCP yang diimplementasikan pada mesin HP 9000/300 (HP -UX6.5), ruang alamat yang letaknya tersebar itu masih dapat dimanfaatkan.
Adanya tambahan ruang alamat dari supplier (pemasok) yang dapat dikendalikan dengan baik oleh claimer (peminta), menyebabkan tersedianya ruang memory yang lebih besar lagi. Ruang alamat yang luas tadi memungkinkan kita meletakkan informasi dalam jumlah yang besar didalamnya, sehingga proses pengolahan informasi dapat dilakukan dengan cepat. Hal ini akan meningkatkan unjuk kerja sistem secara keseluruhan, sehingga operasi pengolahan informasi yang membutuhkan memory yang besar dapat dilakukan dengan efisien dan handal.
Pelaksanaan program yang dibuat untuk melakukan alokasi memori extra pada mesin HP-UX6.5 yang berada dalam keadaan tidak digunakan ternyata berlangsung relatif singkat. Program ini mampu menyediakan ruang memori extra yang cukup besar. Program tersebut juga mampu melakukan dealokasi memori."
1990
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Goran D. Putnik, editor
"This book constitutes the thoroughly refereed post-conference proceedings of the First International Conference on Virtual and Networked Organizations, Emergent Technologies, and Tools, ViNOrg 2011, held in Ofir, Portugal, in July 2011. The 35 revised full papers presentedwere carefully reviewed and selected from over 60 initial submissions. The papers cover a wide range of topics, such as ubiquitous computing and organizations, cloud computing and architectures, grid computing, human-computer interfaces, serious games, data mining, Web services, cognitive systems, social networks and other emergent IT/IS approaches in various function domains, such as decision support systems, planning, design, control, negotiation, marketing, management and many other, in the context of virtual and networked enterprises and organizations."
Berlin: Springer, 2012
e20406434
eBooks  Universitas Indonesia Library
cover
Jonathan Nicholas
"Kebutuhan untuk menyediakan layanan kepada pengguna di seluruh dunia menyebabkan layanan aplikasi web untuk beradaptasi menggunakan teknologi baru dan memadai. Untuk mencapai hal tersebut, layanan cloud servis digunakan untuk memperluas jangkauan geografis dari layanan web di seluruh dunia. Peningkatan kualitas pengembangan deployment aplikasi web terlihat pada Kubernetes, alat yang diadopsi secara luas yang didukung di sebagian besar platform cloud, yang memungkinkan penerapan geo-distributed clusters untuk aplikasi yang memiliki pengguna multinasional. Dikarenakan kelangkaan studi mengenai geo-distributed clusters dan kinerjanya, penelitian ini bermaksud untuk menjembatani kesenjangan pengetahuan tersebut dengan mengimplementasikan solusi menggunakan Istio (Anthos Service Mesh), mesh layanan yang paling banyak digunakan untuk aplikasi Kubernetes, serta solusi cloud native di Google Cloud Platform menggunakan MultiClusterService. Studi ini menemukan bahwa kedua pendekatan tersebut dapat diandalkan, namun, Istio/ASM memiliki latensi yang sedikit lebih rendah untuk sebagian besar request. Kedua pendekatan tersebut merupakan pilihan baik untuk aplikasi global, karena keduanya menggunakan geo-aware load balancing, yang merutekan permintaan pengguna ke klaster terdekat yang tersedia. Basis kode studi dan hasil pengujian ini tersedia secara open-sourced untuk studi lebih lanjut tentang aplikasi berbasis geo-distributed Kubernetes clusters.

With the need of providing services to ever-growing worldwide users, web application services must adapt new technologies in order to fulfill these needs. As setting up physical servers across the globe is a daunting task, cloud service providers are an essential tool to reach geographical coverage for worldwide web services. Further advancements on the developer experience of deploying web applications can be seen in tools such as Kubernetes, a widely adopted tool that’s supported in most cloud platforms that enables the implementation of geo-distributed clusters for applications with a multi-national user base. However, there is a scarcity of studies regarding geo-distributed clusters methods and its performance. Therefore, this study intends to bridge that knowledge gap by implementing a solution using Istio (Anthos Service Mesh), the most used service mesh for kubernetes applications as well as a cloud native solution on Google Cloud Platform using MultiClusterService. This study found that both approaches are reliable, however, Istio / ASM has a slightly lower latency for the vast majority of requests. In addition, both approaches are a viable choice for worldwide applications, as they both use geo- aware load balancing, which routes user requests to the nearest available cluster. This study’s scripts and test results are open-sourced for further studies about geo-distributed Kubernetes- based applications. "
Depok: Fakultas Ilmu Komputer Universitas Indonesia, 2023
S-pdf
UI - Skripsi Membership  Universitas Indonesia Library
cover
Ivan Ivanov, editor
"The cloud computing and services science book comprises a collection of the best papers presented at the International Conference on Cloud Computing and Services Science (CLOSER), which was held in The Netherlands in May 2011. In netting papers from the conference researchers and experts from all over the world explore a wide-ranging variety of the emerging Cloud Computing platforms, models, applications and enabling technologies. Further, in several papers the authors exemplify essential links to Services Science as service development abstraction, service innovation, and service engineering, acknowledging the service-orientation in most current IT-driven structures in the Cloud.
The Cloud Computing and Services Science book is organized around important dimensions of technology trends in the domain of cloud computing in relation to a broad scientific understanding of modern services emerging from services science. The papers of this book are inspired by scholarly and practical work on the latest advances related to cloud infrastructure, operations, security, services, and management through the global network."
New York: Springer , 2012
e20406357
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>