Abstract-The paper presents a performance evaluation of message broker system, Rabbit MQ in high availability -enabling and redundant configurations. Rabbit MQ is a message queuing system realizing the middleware for distributed systems that implements the Advanced Message Queuing Protocol. The scalability and high availability design issues are discussed. Since HA and performance scalability requirements are in conflict, scenarios for using clustered RabbitMQ nodes and mirrored queues are presented. The results of performance measurements are reported.
Background and purpose: Despite their clear relevance to human life, microchip implants are still widely viewed as negative, threatening our privacy and raising growing concerns about our health. This paper aims to investigate the important factors influencing people’s perception of microchip implants and their willingness to use them for different purposes. Methodology: The cross-sectional study was conducted in three European countries and the data were analysed using the group Structural Equation Modeling approach. Only complete answers to the online survey questionnaire items were used representing a convenience sample of 804 respondents. Results: The results show that perceived ease of use, usefulness and perceived trust are significant predictors of intention to use microchip implants. Perceived trust is influenced by privacy and technology safety. Concerns about painful procedures and other health concerns reduce the perceived usefulness of microchip implants. Apart from the predictor health concerns, the results were similar in all countries. Conclusion: Based on the presented results, researchers interested in investigating the actual use of microchip implants can establish a solid foundation for their research. The results may assist policy makers in developing the regulations to ensure the safe use of microchip implants and allow for a higher level of security. As a follow-up, investigation of changes in the acceptance of microchip implants following the threat of a global pandemic is proposed.
Abstract:In this article, authors analyze methods of the analysis of data integrity, security and availability loss results for business processes. Assessing those results, one can judge the importance of a process in organization; thus, determine which business process requires more attention. The importance of those processes can be determined with Business Impact Analysis (BIA). In article, first phase of BIA is presented -in specific, a construction of Business Impact Category Tables, Loss Levels and process weight calculation methods. A variety of weight calculating methods is presented. Authors also present their proposed method -square sum percentage -as a solution eliminating problems of other weight calculation methods in business impact analysis.
Abstract. Today, even for small businesses, data and IT services must be cloudready and available at any time, from any location, by anyone. End-user appreciate (and increasingly, expect) of always-on business resources and non-disruptive operations. Improving data backup and recovery, and business continuity / disaster recovery are among top 10 IT priorities. As gateway is often the most vulnerable network element, this article focuses on an Internet protocol called VRRP (Virtual Router Redundancy Protocol) utilization as it enables the ability to have backup routers when using a statically configured router at some point of a local area network.A redundant, cost-effective network block instead of one single router is presented, along with test topology and some guidelines. Test results are included and discussed. IntroductionIn reality world, typical business computer network is not funded enough to be equipped with complex solutions. The goal is simple -the network has got to be deployed and maintained at minimum cost. Most of time, typical SOHO network would consist of one edge router, single physical server and minimized secondlayer network infrastructure. Moreover, IT departments are under constant pressure of cost cutting -or cost avoidance, if the head of IT is not too much concentrated on the infrastructure lower level. The difference is that cost avoidance requires some initial strategic capital outlay, which is recovered through reductions in operational costs, productivity, or other savings realized through deploying the technology.
Abstract. IPv6 is a new version of IP protocol, which was defined in the series of RFC documents at the end of previous century. Although developments and improvements are conducted for many years already, a new standard still did not get such distribution as IPv4. The useful innovation and one of basic advantages of IPv6 protocol is a possibility of automatic assignment of addresses to the network devices. Such mode got the name SLAAC (StateLess Address AutoConfiguration). However, there are tasks, for implementation of which greater control is needed. In this case it is necessary to use the static addressing or DHCPv6 server for IPv6 protocol (stateful autoconfiguration). The aim of this work was to visualize an IPv6 network using stateless and stateful addressing modes and to reveal the features and security issues of the specific configurations. Those security issues need to be reminded to the administrators, as the big IPv6 migration is coming for small and medium businesses.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.