Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Internet Deployment

Fourteen Cabinet servers were deployed on the Internet (WWW) over a dedicated 2x2 GHz 4 GB G5DP over a corporate T1 connection. As with most Internet servers, performance is connection-limited, so sheer server performance is not the limiting factor. However, operation over the Internet has its own special issues, some of which Cabinet ran into. [Pg.265]

The production Internet deployment of Cabinet has proven to be robust and reliable. The first two months of operation were analyzed carefully. Average usage was 182000 HTTP requests processed per day. Service was interrupted four times twice due to external network glitches, once due to a power failure that exceeded the UPS backup capacity, and once due to a botched server upgrade (which affected only one service for 5 min). Overall uptime was 99.85% during this period. [Pg.266]


Obviously, scale up and cost are reciprocally related, and while relatively small-scale deployment for research purposes is possible at current costs (dozens of devices), unit costs must be driven down by orders of magnitude before large scale deployment of devices is feasible. However, the vision from the engineering community is that everything that costs over 25 except food will be connected to the Internet [15]. To quote Kris Pister, from UC Berkeley, by 2010, RF circuits capable of trans-... [Pg.135]

A federated database system based on web technology has been designed, implemented and deployed in local, intranet and Internet environments. A number of constituent databases have been deployed that represent a wide variety of data models, for... [Pg.266]

Before launching the Leurre.com project, we have investigated the usefulness of honeypots to analyze Internet threats. Therefore, a first platform has been deployed for almost two years and its results analyzed. Experience gained led to the publications of several papers and to several iterations in the design of the database used to store the information. The most important results can be summarized as follows ... [Pg.232]

Java Applets and Applications Java applets are small programs written in Java, which can be deployed over the Internet to the users computers and viewed within a HTML page. Java applications are formal computer programs written in Java, but are stand-alone programs not requiring a browser to run. [Pg.513]

Document and verify application scripting and automated deployment processes Restrict installation of unauthorized software and downloads from the Internet Install vims protection Provide locked facilities... [Pg.853]

First DataBank has developed numerous drug reference products for healthcare applications, in both print and electronic forms. Most of these products can be deployed on an individual desktop, a local area network and, in some cases, over the Internet or intranet,... [Pg.360]

Typically, for BRIO " application development a database administrator can provide a catalog hie that contains the necessary connection information for the database of interest. Permission must also typically be granted for access to the database outside of the normal data-access application. BRIO hies can be deployed as Web applicahons provided the client machine has the BRIO plug-in for Microsoft Internet Explorer. The graphing options within BRIO are somewhat limited for complex scienhhc charting and visualizahon. However, ad hoc queries have the hexibility and power to create custom data pivot tables that can be automatically exported... [Pg.522]

As to the envisaged users of the system, for the duration of the project, the idea is to provide timely information to researchers belonging to organizations involved in the project and, upon the project s completion, make this information available to public users in an open database. On the matter of method of access, direct access via the Internet has been chosen. At the inception of the project, a network was deployed using modems connected to the public telephone lines but, in response to changes in the network environment cause by the growing availabUity of the Internet, a switch was made to direct access via the net. [Pg.102]

D. Lekkas, S. Gritzalis, and S. Katsikas. 2002. Quality assured trusted third parties for deploying secure internet-based healthcare applications. International Journal of Medical Informatics 65 79-96. [Pg.548]

A system like the one described has been deployed successfully by United Parcel Service using two different platforms. The data preparation is implemented on local computers available at all company locations. The optimization dgorithms are solved remotely on large computers at another location using the company s intranet. The fact that two different platforms are used is hidden from the users, who are informed by e-mail about the status of a submitted job at various stages and get all the reports on the intranet. This kind of application is now possible because of the increase in computer power that permits the solution of difficult optimization problems in reasonable time emd because of the evolution of the Internet that provides the tools supporting a remote implementation. [Pg.817]

The use of the Internet will expand exponentiaUy. CUent/server solutions that became main stream in the 1990s have their drawbacks. From an IT standpoint, their thick client software is costly to deploy and support. They are difficult to integrate with other external applications. Their client software also tends to run on only one type of device, a desktop PC. Using development tools like... [Pg.1621]

Thus, it is no surprise that logistics management has been transformed in the last 10 years from a largely manual process to a more automated one. Major advances in computer and communications technology and the introduction of the Internet and e-commerce have effected this trend. These developments provide new opportunities and increase expectations for a fast and flawless logistics process. The Internet also provides new models in how information systems ate deployed. For instance, companies may not need to own the sophisticated DSS— they are able to lease them based on their needs. This mode of deployment is now referred to as application service provider (ASP) and is considered one of the most important trends in information systems, especially for mid-sized companies who cannot afford expensive systems. [Pg.2019]

Fonr instrnments were deployed in unmanned sites, where they monitored VOCs in natural waters and wastewater during a period exceeding one year for each instrument The instruments were equipped with software that facilitated the automatic operation of each analysis, the identification and quantitation of VOCs from the raw mass spectra, and the transmission of the results to a remote control room via internet connection. In the remote control room, a personal computer with dedicated software displayed the results as bar graphs and was programed to activate alarms when set concentration thresholds were exceeded. Laboratory performance in terms of sensitivity, reproducibility, linearity tests, and comparison with P T/GC/MS together with field performance in terms of data output, most frequent maintenance operations and technical failures, and overall stability of the four remotely-controlled instruments are discussed. [Pg.494]

In the next section, 1 briefly describe some design heuristics. This is followed by a discussion of current research on the deployment of large networks in areas without infrasffucture support. The next section focuses on how sensor networks in vehicles can be linked with the Internet. [Pg.91]

The timely management of an end-to-end supply chain has become a challenging task in large and medium enterprises with distributed units scattered across the globe. In this chapter, the supply chain has been treated in a generic way, and no assumption has been made on the nature of the chain. It could be the data transferred over the Internet or the supply of arms to the ground troop deployed in the war field. [Pg.260]

Many mining installations are located in remote areas of the globe and it can take time to deploy resources to these areas when service is required. At the time that resources are deployed, often the cause of the problem is not fully understood and additional time is spent waiting for parts to arrive at site once the cause is diagnosed. The Hepburn Hoist Care remote access system allows authorized personnel full secure access to a hoist automation system remotely via the internet. It allows authorized hoisting technical experts to immediately and directly participate in troubleshooting efforts from off-site locations and potentially correct issues without a physical presence on site. A very important feature of the system which will be discussed in further detail is the abihty to maintain security of the system while it is accessible via the internet. [Pg.286]


See other pages where Internet Deployment is mentioned: [Pg.265]    [Pg.266]    [Pg.265]    [Pg.266]    [Pg.580]    [Pg.732]    [Pg.88]    [Pg.130]    [Pg.124]    [Pg.176]    [Pg.231]    [Pg.136]    [Pg.428]    [Pg.120]    [Pg.736]    [Pg.103]    [Pg.369]    [Pg.520]    [Pg.189]    [Pg.114]    [Pg.121]    [Pg.157]    [Pg.195]    [Pg.138]    [Pg.22]    [Pg.555]    [Pg.306]    [Pg.20]    [Pg.80]    [Pg.81]    [Pg.38]    [Pg.40]    [Pg.1892]    [Pg.490]   


SEARCH



Deploye

Deployment

Internet

© 2024 chempedia.info