Article Review 1:
Service Oriented Architecture
by :Daniel D. Messina(http://messinad.dyndns.org:8060/)
reviewed: Abhaykumar Kumbhar(http://sites.google.com/site/abhaykumar1432/home/vu-computing/distributed-system/article-reviews)
ARTICLE 1: Increased Intrinsic Interoperability
TARGET AUDIENCE:
A large Business organization which takes into account social, political, and organizational factors that impact system to system performance. Example Medical Industry, eGovenment, Railways ,Public Safety.
TYPE OF DOCUMENT:
In this website Thomas Erl gives a brief insight of his book over SOA. The article here is mostly gives both Technical reference and Tutorial about SOA.
SUMMARY OF ARTICLE:
Interoperability is a property referring to the ability of diverse systems and organizations to work together (inter-operate).This establishes an environment wherein services produced by different projects at different times can be repeatedly assembled together into a variety of composition configurations to help automate a range of business tasks.
CONCLUSION:
The most important thing that you learned from this article is the concepts of Interoperability .The benefits of Interoperability are really good and I would recommend an organization/Person to know it. Villanova computing Science Dept Offers SOA as special topic and since I failed to take this subject, this article/ homepage of this article gives me a good idea of SOA.
**********************************************************************************************************
Article Review 2:
VIRTUAL PRIVATE NETWORKS
By: Di (Aaron) Hu (http://www.tvobjects.com/products/docs/JDBC.html )
Reviewed: Abhaykumar Kumbhar (http://sites.google.com/site/abhaykumar1432/home/vu-computing/distributed-system/article-reviews)
ARTICLE: Introduction of JDBC Drivers
TARGET AUDIENCE:
A large Business organization (any organization in general) which needs to keep the track of large databases and access data from different types of database systems.
TYPE OF DOCUMENT:
This article link, describes JDBC, looks like a product/ work of Diamond Edge, Inc. where in the article tries to explain the work done by the researchers.
SUMMARY OF ARTICLE:
JDBC (Java Database Connectivity) API has become an important tool, so this article gives an idea about how a JDBC works its architecture and finally a linking a JDBC and URL.
CONCLUSION:
The JDBC is going to be most important thing. When a Corporate Company or any organization grows it has large responsibility of database handle and with various Database systems available in market we need an API to interface all the database systems and JDBC perfectly does that job.
*********************************************************************************************************
Article Review 3:
REPLICATION
By Student : Vijish Vijayan (http://sites.google.com/site/vijishsite/home/distributed-systems/presentation-topics/distributed-systems-articles)
Reviewed by: Abhaykumar Kumbhar (http://sites.google.com/site/abhaykumar1432/home/vu-computing/distributed-system/article-reviews)
ARTICLE: REPLICA CONTROL IN DISTRIBUTED SYSTEMS
TARGET AUDIENCE:
A large Business organization (any organization in general) which needs to keep the track of large databases and replication of Data. This paper will also act as foundation for further developments in replication control for various researchers
TYPE OF DOCUMENT:
This article looks like a research paper from Columbia University , Dept of Computer Science, where the idea of replica control asynchronous manner is presented
SUMMARY OF ARTICLE:
An asynchronous approach is proposed for replica control in distributed systems. This approach applies an extension of serializability called epsilon-serializability (ESR),Various replica control methods that maintain ESR are described and analyzed. Because these methods do not require users to refer explicitly to ESR criteria, they can be easily encapsulated in high-level applications that use replicated data.
CONCLUSION:
Asynchronous updates have the potential of increasing performance and availability while allowing autonomy. Updates to replicas are done via epsilon transactions(ETs), which ensure the epsilon serializability(ESR) correctness criterion. Practical replica control methods work by imposing restrictions on the set of concurrent executions. Asynchronous method guarantees replica convergence while at the same time taking advantage of asynchronous update propagation.
***************************************************************************************************************************************************
Article Review 4:
CLOUD COMPUTING
by student : Bharti Gupta (http://sites.google.com/site/almanacbiz/home/topic-for-distributed-systems-cloud-computing)
reviewed by: Abhaykumar Kumbhar (http://sites.google.com/site/abhaykumar1432/home/vu-computing/distributed-system/article-reviews)
ARTICLE: The Top 10 Cloud Computing Trends
TARGET AUDIENCE:
A Business organization (large, medium and small) which takes into account datacenters, security and enhancement of the performance.
TYPE OF DOCUMENT:
In this website David Hakala gives a brief insight of his analysis over top 10 cloud computing trends. The article here is one of the gives research works of David Hakala over cloud computing.(if we search about the author on the website FOCUS we get lots of his works)
SUMMARY OF ARTICLE:
Cloud Computing is fast becoming a trend/technology for IT companies to managing massive datacenters , reduce burden on IT staff ,rewire resources in a cloud. Since Cloud-Computing resource are customizable we have Large enterprises turning towards Cloud Computing. And soon Desktop Applications will get a makeover.
CONCLUSION:
The most important thing that you learned from this article is the the trends of Cloud-Computing .The benefits of Cloud Computing looks promising
right from datacenters , security , infrastructure , managing resources. If I would recommend this to managers (who manage Information Systems).
****************************************************************************************************************************************************
Article Review 5:
INTELLIGENT AGENTS
Article By Student: Sandhya Varanasi
(http://www35.homepage.villanova.edu/sandhyarani.varanasi/mytopic.htm)
Reviewed by: Abhaykumar Kumbhar
(http://sites.google.com/site/abhaykumar1432/home/vu-computing/distributed-system/article-reviews)
ARTICLE: Intelligent Agent For Intrusion Detection.
TARGET AUDIENCE:
The article presents a great deal of knowledge for Researchers and students who are working in field of Computer Immunology.
TYPE OF DOCUMENT:
The article is a research paper given by the students and professor of the Iowa State University.
SUMMARY OF ARTICLE:
Computer Immunology has become into great importance due the security threat to the network.
Agents and Monitors have been developed to countermeasure the threats. And Artificial Intelligence is one such step to measure the severity of events. Artificial Intelligence uses collaborative information and mobile agent technologies. A intelligent agent uses a System call function to trace various events.
CONCLUSION:
The System call approach for the intelligent agent seems be promising and show good results. The future work for intelligent agents is needed (JAM) and this can become a good countermeasure for the security threats to our networks.
Distributed Home next page>>