Explore chapters and articles related to this topic
Analysis of Security Challenges and Threats in Social Network and Cloud Computing
Published in Pankaj Bhambri, Sita Rani, Gaurav Gupta, Alex Khang, Cloud and Fog Computing Platforms for Internet of Things, 2022
K.P. Bindu Madavi, P. Vijayakarthik
Multiple numbers of online users have been enrolled in the social network. Users have access to their information and can post it on social media. Therefore, computation has increased the independence of interaction. Many privacy issues exist in using cloud data centers. Cloud providers must trust social network providers with their data. It may be a smart idea to combine private and public cloud data centers. The Amazon, Azure, and Google Cloud are only a few of the cloud service providers with various data centers that help with storing and handling private data. This research examines the security and privacy issues that arise from the use of cloud technologies in social networks. Since social networking sites have millions of users in various places, this is the reason they are generally appropriate for cloud adaptation. Since they store rich multimedia content inside cloud networks, social networks have also aided in improving web usability. For example, audio and video files take up a lot of memory and can slow down any website. Amazon and Salesforce are two examples of vendors that provide this service. Backup and data recovery costs have been drastically reduced by cloud computing. Cloud computing technology was used daily, whether to send messages, upload videos, or store photographs. The main goal of social networking is to reach out to a specific audience, which is exactly what you would expect to do if you store your data in the cloud. This is because while data is processed in the cloud, anybody with Internet access can access it.
Frequency Synthesis and Clock Recovery
Published in Bang-Sup Song, Micro CMOS Design, 2017
Phase-locked loop (PLL) finds its uses in mainly five different areas. The first area is the conventional synchronous demodulation for amplitude modulation (AM), phase modulation (PM), and frequency modulation (FM). The second area is the clock/data recovery (CDR) for digital communications, such as phase shift keying (PSK), frequency shift keying (FSK), compact disc (CD), digital video disc (DVD), and hard disk. All data receivers require CDR, which is now being implemented mostly in the digital domain. Even receivers for fiber networks will be implemented digitally. PLL for this application is a narrow-band PLL for jitter attenuation, and uses no-return-to-zero (NRZ) phase detector. The third area is RF frequency synthesis. RF signals are still analog and require very low phase noise. PLL for this is a wideband PLL with low spurious tones to reduce the voltage-controlled oscillator (VCO) phase noise. The fourth area is the clock generation and multiplication. Most digital systems need numerous synchronized clocks. The PLL design for this application is the most difficult as it requires both low VCO phase noise and low input clock jitter. Last, the fifth area is clock synchronization. Clocks and data in high-speed digital systems need to be time-aligned to eliminate clock skew without jitter accumulation, and this is often implemented using a delay locked loop (DLL).
Storage System Basics
Published in Al Kovalick, Video Systems in an IT Environment, 2013
Each of these factors impacts various performance metrics. Figure 3A.9 shows a “billiard table” diagram with each side being one of the four factors just described. It is assumed that the array is not laboring under any failure modes (RAID data recovery in use). The purpose of the diagram is to encapsulate all four of the metrics into one visual imprint. Starting at the bottom left and moving clockwise around the outside, the left axis is a measure of user data access patterns (strong influencer of access bandwidth), the top is a measure of the mix of R/W transactions (influencer of access bandwidth), the right axis is the total throughput utilization (measure of latency), and the bottom axis is a measure of the remaining capacity of the array. For each of the four axes, moving clockwise is an improving metric. For example, the top of the right axis indicates 100 percent utilization of the array. For this case, the R/W requests form a deep queue, and therefore transaction latency is inevitable due to the heavy loading. However, the lower portion of the right axis is 0 percent utilization, so the occasional R/W request gets immediate response because there are no other requests to compete for storage resources. These four elements are developed in the following sections.
Adoption Intention of Cloud Computing at the Firm Level
Published in Journal of Computer Information Systems, 2019
To increase firm adoption intention, cloud-computing providers should reduce their perception of financial risk, security risk, technique risk, and user risk. To reduce financial risk, the providers can explain how the adoption of the cloud computing does not damage firms’ financial health, provide a reasonable price mechanism, and offer firms the freedom to choose the most cost-effective solutions from cost-saving program. The other possible actions include offering discounts and compensation for the costs involved in the cloud-computing acquisition, repairs, and maintenance. To reduce security risk, the cloud-computing providers can provide knowledge regarding cloud-computing security mechanisms, such as data safety, data dissemination and communication security, data leaking, and theft, data recovery, and user access privilege, to show that cloud computing is very secure. They can provide investigative support to track destruction of data integration and malicious insiders and unauthorized users in cloud computing. Cloud-computing providers should explain the distributed nature of data stored in multiple data centers. They should educate firms about the authentication and authorization mechanisms, and how the mechanisms prevent risks for damages caused by hacking attacks and unauthorized access. Offering security guarantee warrants and delivering reports on third-party inspections of cloud-computing security strengths are alternatives for reducing or eliminating firm concerns regarding potential security losses.