The target audience here is people who want a good visual explanation and overview of cloud computing. Also the target audience is youtube viewers.
Type of Document
This is an informative video. It is an informal document.
Summary of Video
This video goes through the different factors of the cloud computing trend. The narrator relates cloud computing to Web 2.0. He then goes on to explain how hardware and software can be provided as a service. He gives a metaphoric overview of the way it works. Then he comes full circle to explain the implications of cloud computing and its potential as a big technology.
It was a very informative video and good for people who might not have been introduced to cloud computing before. It is good for a big picture overview also. However, it probably is not a good resource for in depth analysis.
[ add comment ] ( 22 views ) | permalink | related link
http://www35.homepage.villanova.edu/san ... .varanasi/
This is defenitely an academic paper. I think the target audience would be professionals, students, or academics who are doing research on this topic.
Type of Document
This is an academic document that explores a formally defined process. The document was supported by a contract with the US Department of Energy
Summary of Article
This article describes a technique used for intrusion detection. It is a data mining technique in which a distributed system of intelligent agents can detect intrusion. They used a Java framework for Meta-Learning to implement this expirement. The intelligent agents were trained with data before being able to detect intrusion.
The experiment was a success, and they were able to implement intrusion detection by using this data mining technique on a distributed system of Java-implemented intelligent agents. This seems like a valid place to look for a model for implementing a network of intelligent agents.
[ add comment ] ( 6 views ) | permalink | related link
- applet based anonymous distributed computing system
http://www.emeraldinsight.com/Insight/v ... tId=863699
http://hackaday.com/2009/03/03/distribu ... avascript/
[ add comment ] ( 1 view ) | permalink
OnionCoffee, which is an attempt at creating a Java implementation of Tor. However, this project is out dated, full of bugs and incomplete. OC (OnionCoffee) does not have the capability to run a relay (to become a node in the Tor network). I propose to update the OnionCoffee code and implement the Relay functionality in OnionCoffee. This is an integral part in the distributed system, because the relay will be responsible for setting up circuits in the Tor network, as well as handle distributed key exchange. The specifications for a Tor client can be found at https://git.torproject.org/checkout/tor/master/doc/spec/tor-spec.txt. For my project I would like to fork the OnionCoffee project and bring it up to the Tor client specifications, including the relay capability.
Use Case Diagram
[ 1 comment ] ( 9 views ) | permalink
The Vidalia Control Panel is a GUI Control Panel for a client's connection with the Tor network. Part of this Control Panel is a map of the world showing the location of every exit node. My goal for this project is to be able to choose your exit node from this map and reconfigure the client's Tor route to exit from this selected exit node.
[ add comment ] ( 2 views ) | permalink | related link