AWS

AWS
  • 文章类型: Case Reports
    基于云的解决方案是数据密集型计算的现代必需品。本案例报告详细描述了在Emory-一个安全的、可靠,和可扩展的平台,以存储和分析来自医疗保险和医疗补助服务中心(CMS)的可识别研究数据。
    CMS的跨学科团队,MBL技术,和埃默里大学合作,确保遵守整合法律的CMS政策,法规,以及信息安全和隐私的其他驱动因素。
    一个专门的团队确保从物理存储服务器成功过渡到基于云的环境。这包括实施访问控制,漏洞扫描,和审核日志,这些日志将通过补救计划定期审查。用户适应需要特定的培训来克服云计算的挑战。
    挑战创造了通过创建CMS接受的最终产品并在整个大学范围内跨学科共享的经验教训的机会。
    UNASSIGNED: Cloud-based solutions are a modern-day necessity for data intense computing. This case report describes in detail the development and implementation of Amazon Web Services (AWS) at Emory-a secure, reliable, and scalable platform to store and analyze identifiable research data from the Centers for Medicare and Medicaid Services (CMS).
    UNASSIGNED: Interdisciplinary teams from CMS, MBL Technologies, and Emory University collaborated to ensure compliance with CMS policy that consolidates laws, regulations, and other drivers of information security and privacy.
    UNASSIGNED: A dedicated team of individuals ensured successful transition from a physical storage server to a cloud-based environment. This included implementing access controls, vulnerability scanning, and audit logs that are reviewed regularly with a remediation plan. User adaptation required specific training to overcome the challenges of cloud computing.
    UNASSIGNED: Challenges created opportunities for lessons learned through the creation of an end-product accepted by CMS and shared across disciplines university-wide.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    背景:孤独和社会隔离被认为是关键的公共卫生问题。老年人在处理诸如独居之类的事情时,面临更大的孤独和社会孤立的风险,失去家人或朋友,慢性病,和听力损失。孤独会增加一个人因各种原因过早死亡的风险,包括痴呆症,心脏病,和中风。为了解决这些问题,在医疗保健和老年人护理中,技术平台的加入和商业监测设备的使用正在大大增加。
    目的:本研究的目的是设计和开发一种孤独监视无服务器体系结构,以通过应用程序编程接口从商业活动腕带中获取实时数据。
    方法:对于体系结构的设计和开发,已使用AmazonWebServices平台。为了监视孤独,选择了FitbitCharge5手镯。通过AWSLambda服务提供的Web应用程序编程接口,由于事件桥,数据以自动频率获取并存储在AWS服务中。
    结果:在系统的试点阶段,它在易于收集数据和编程采样频率方面显示出很大的可能性。一旦提出请求,自动分析数据以监控孤独感。
    结论:所提出的体系结构显示出易于收集数据的巨大潜力,分析,安全,个性化,实时推理,以及未来传感器和执行器的可扩展性。它具有强大的好处,适用于卫生部门,并减少抑郁症和孤独感。
    BACKGROUND: Loneliness and social isolation are recognized as critical public health issues. Older people are at greater risk of loneliness and social isolation as they deal with things like living alone, loss of family or friends, chronic illness, and hearing loss. Loneliness increases a person\'s risk of premature death from all causes, including dementia, heart disease, and stroke. To address these issues, the inclusion of technological platforms and the use of commercial monitoring devices are vastly increasing in healthcare and elderly care.
    OBJECTIVE: The objective of this study is to design and develop a loneliness monitor serverless architecture to obtain real-time data from commercial activity wristbands through an Application Programming Interface.
    METHODS: For the design and development of the architecture, the Amazon Web Services platform has been used. To monitor loneliness, the Fitbit Charge 5 bracelet was selected. Through the web Application Programming Interface offered by the AWS Lambda service, the data is obtained and stored in AWS services with an automated frequency thanks to the event bridge.
    RESULTS: In the pilot stage in which the system is, it is showing great possibilities in the ease of collecting data and programming the sampling frequency. Once the request is made, the data is automatically analyzed to monitor loneliness.
    CONCLUSIONS: The proposed architecture shows great potential for easy data collection, analysis, security, personalization, real-time inference, and scalability of sensors and actuators in the future. It has powerful benefits to apply in the health sector and reduces cases of depression and loneliness.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    域名系统(DNS)协议是互联网运行的基础,然而,近年来,已经开发了各种方法来实现对组织的DNS攻击。在过去的几年里,随着网络犯罪分子使用多种方法来利用云服务,组织对云服务的使用增加带来了进一步的安全挑战,配置和DNS协议。在本文中,两种不同的DNS隧道方法,碘和DNScat,已在云环境(Google和AWS)中进行,并在不同的防火墙配置下取得了积极的外渗结果。对于网络安全支持和专业知识有限的组织来说,检测DNS协议的恶意使用可能是一个挑战。在这项研究中,在云环境中利用各种DNS隧道检测技术来创建具有可靠检测率的有效监控系统,实施成本低,和易于使用的组织与有限的检测能力。弹性堆栈(开源框架)用于配置DNS监控系统并分析收集的DNS日志。此外,有效载荷和流量分析技术被实施以识别不同的隧道方法。这种基于云的监控系统提供了各种检测技术,可用于监控任何网络的DNS活动,尤其是小型组织可访问的网络。此外,Elasticstack是开源的,它对每天可以上传的数据没有限制。
    The domain name system (DNS) protocol is fundamental to the operation of the internet, however, in recent years various methodologies have been developed that enable DNS attacks on organisations. In the last few years, the increased use of cloud services by organisations has created further security challenges as cyber criminals use numerous methodologies to exploit cloud services, configurations and the DNS protocol. In this paper, two different DNS tunnelling methods, Iodine and DNScat, have been conducted in the cloud environment (Google and AWS) and positive results of exfiltration have been achieved under different firewall configurations. Detection of malicious use of DNS protocol can be a challenge for organisations with limited cybersecurity support and expertise. In this study, various DNS tunnelling detection techniques were utilised in a cloud environment to create an effective monitoring system with a reliable detection rate, low implementation cost, and ease of use for organisations with limited detection capabilities. The Elastic stack (an open-source framework) was used to configure a DNS monitoring system and to analyse the collected DNS logs. Furthermore, payload and traffic analysis techniques were implemented to identify different tunnelling methods. This cloud-based monitoring system offers various detection techniques that can be used for monitoring DNS activities of any network especially accessible to small organisations. Moreover, the Elastic stack is open-source and it has no limitation with regards to the data that can be uploaded daily.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    背景:越来越多的证据表明发育性口吃与注意力有关。然而,调查结果代表了矛盾。因此,本研究旨在探讨在静息和任务不足的情况下口吃与注意力之间的可能关系.
    方法:在一项横断面研究中,注册了26名右撇子AWS(口吃的成年人)和25名匹配的流利使用者。收集了人口统计数据,并为所有参与者填写了贝克焦虑清单(BAI)。然后,进行了QEEG,其次是IVA2。所有受试者的CPT测试。最后,数据使用SPSS软件版本16进行分析。
    结果:AWS表明任务中的听觉集中注意力(p=.02)明显弱于对照组,而两组之间发现了相似的静息状态脑电图注意标记(p>.05)。此外,注意力在两个条件之间没有相关性(p>.05)。
    结论:注意的EEG标记不一定指定任务下AWS的注意表现。此外,注意技能可以在至少某些AWS组的评估和治疗计划中考虑。
    There is increasing evidence that connects developmental stuttering to attention. However, findings have represented contradiction. Therefore, this study was conducted to investigate the possible relationship between stuttering and attention in resting and undertask conditions.
    In a cross-sectional study, 26 right-handed AWS (adults who stutter) and 25 matched fluent speakers were enrolled. Demographic data were collected, and the Beck anxiety inventory (BAI) was filled out for all participants. Then, QEEG was conducted, followed by IVA2. CPT test for all subjects. Finally, data were analyzed using SPSS software version 16.
    AWS indicated significantly weaker auditory focus attention in the task (p = .02) than the control group, while a similar resting-state EEG marker of attention was found between groups (p > .05). Moreover, attention was not correlated between the two conditions (p > .05).
    The EEG marker of attention did not necessarily designate the attentional performance of AWS under the task. Furthermore, attentional skills could be considered in the assessment and therapeutic programs of at least some groups of AWS.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    Recent developments in single-cell analysis has provided the ability to assay >50 surface-level proteins by combining oligo-conjugated antibodies with sequencing technology. These methods, such as CITE-seq and REAP-seq, have added another modality to single-cell analysis, enhancing insight across many biological subdisciplines. While packages like Seurat have greatly facilitated analysis of single-cell protein expression, the practical steps to carry out the analysis with increasingly larger datasets have been fragmented. In addition, using data visualizations, I will highlight some details about the centered log-ratio (CLR) normalization of antibody-derived tag (ADT) counts that may be overlooked. In this method chapter, I provide detailed steps to generate CLR-normalized CITE-seq data using cloud computing from a large CITE-seq dataset.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    爱丽丝梦游仙境综合征(AIWS)是一种知觉障碍,包括一系列自我体验的阵发性身体形象错觉,包括最常见的形状扭曲(变形),大小(macropsia或micropsia),距离(peloppsia或telopsia),运动,和颜色以及其他视觉和审美扭曲。去个性化,失实,和幻听也有描述。最近的报道表明,传染病是AIWS的主要病因,尤其是在儿童中。本文回顾了有关AIWS感染与发展之间关系的最新认识。
    Alice-in-Wonderland syndrome (AIWS) is a perceptual disorder embracing a spectrum of self-experienced paroxysmal body image illusions including most commonly distortions of shape (metamorphopsia), size (macropsia or micropsia), distance (pelopsia or teleopsia), movement, and color among other visual and somesthetic distortions. Depersonalization, derealization, and auditory hallucinations have also been described. Recent reports suggest that infectious diseases are the predominant etiology for AIWS, especially among children. This article reviews current understanding regarding the association between infection and development of AIWS.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    UNASSIGNED: NGScloud was a bioinformatic system developed to perform de novo RNAseq analysis of non-model species by exploiting the cloud computing capabilities of Amazon Web Services. The rapid changes undergone in the way this cloud computing service operates, along with the continuous release of novel bioinformatic applications to analyze next generation sequencing data, have made the software obsolete. NGScloud2 is an enhanced and expanded version of NGScloud that permits the access to ad hoc cloud computing infrastructure, scaled according to the complexity of each experiment.
    UNASSIGNED: NGScloud2 presents major technical improvements, such as the possibility of running spot instances and the most updated AWS instances types, that can lead to significant cost savings. As compared to its initial implementation, this improved version updates and includes common applications for de novo RNAseq analysis, and incorporates tools to operate workflows of bioinformatic analysis of reference-based RNAseq, RADseq and functional annotation. NGScloud2 optimizes the access to Amazon\'s large computing infrastructures to easily run popular bioinformatic software applications, otherwise inaccessible to non-specialized users lacking suitable hardware infrastructures.
    UNASSIGNED: The correct performance of the pipelines for de novo RNAseq, reference-based RNAseq, RADseq and functional annotation was tested with real experimental data, providing workflow performance estimates and tips to make optimal use of NGScloud2. Further, we provide a qualitative comparison of NGScloud2 vs. the Galaxy framework. NGScloud2 code, instructions for software installation and use are available at https://github.com/GGFHF/NGScloud2. NGScloud2 includes a companion package, NGShelper that contains Python utilities to post-process the output of the pipelines for downstream analysis at https://github.com/GGFHF/NGShelper.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Pubmed)

  • 文章类型: Journal Article
    2019年,大多数公司至少使用了一项云计算服务,预计到2021年底,云数据中心将处理94%的工作负载。将IT基础设施转移到专业云提供商的财务和运营优势显然引人注目。然而,随着如此大量的私人和个人数据被存储在云计算基础设施中,安全问题已经上升。积极监测和分析敌对活动,我们在流行的云提供商上部署了多个蜜罐,即亚马逊网络服务(AWS),GoogleCloudPlatform(GCP)和MicrosoftAzure,并在多个地区运营。在2020年5月的三周内收集了日志,然后进行了比较分析,评估和可视化。我们的工作揭示了异构攻击者在每个云提供商上的活动,当人们考虑攻击的数量和起源时,以及目标服务和漏洞。我们的结果强调了威胁行为者滥用大众服务的企图,在COVID-19大流行期间广泛用于远程工作,例如远程桌面共享。此外,攻击似乎不仅来自通常被认为是攻击来源的国家,比如中国,俄罗斯和美国,但也来自越南等不常见的国家,印度和委内瑞拉。我们的结果提供了我们实验中对抗性活动的见解,可用于通知组织的态势感知操作。
    In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The financial and operational advantages of moving IT infrastructure to specialised cloud providers are clearly compelling. However, with such volumes of private and personal data being stored in cloud computing infrastructures, security concerns have risen. Motivated to monitor and analyze adversarial activities, we deploy multiple honeypots on the popular cloud providers, namely Amazon Web Services (AWS), Google Cloud Platform (GCP) and Microsoft Azure, and operate them in multiple regions. Logs were collected over a period of three weeks in May 2020 and then comparatively analysed, evaluated and visualised. Our work revealed heterogeneous attackers\' activity on each cloud provider, both when one considers the volume and origin of attacks, as well as the targeted services and vulnerabilities. Our results highlight the attempt of threat actors to abuse popular services, which were widely used during the COVID-19 pandemic for remote working, such as remote desktop sharing. Furthermore, the attacks seem to exit not only from countries that are commonly found to be the source of attacks, such as China, Russia and the United States, but also from uncommon ones such as Vietnam, India and Venezuela. Our results provide insights on the adversarial activity during our experiments, which can be used to inform the Situational Awareness operations of an organisation.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Sci-hub)

       PDF(Pubmed)

  • 文章类型: Journal Article
    There are many advantages for deploying a mass spectrometry workflow to the cloud. While \"cloud computing\" can have many meanings, in this case, I am simply referring to a virtual computer that is remotely accessible over the Internet. This \"computer\" can have as many or few resources (CPU, RAM, disk space, etc.) as your demands require and those resources can be changed as you need without requiring complete reinstalls. Systems can be easily \"checkpointed\" and restored. I will describe how to deploy virtualized, remotely accessible computers on which you can perform your basic mass spectrometry data analysis. This use is a quite restricted microcosm of what is available under the umbrella of \"cloud computing\" but it is also the (useful!) niche use for which straightforward how-to documentation is lacking.This chapter is intended for people with little or no experience in creating cloud computing instances. Executing the steps in this chapter, will empower you to instantiate a computer with the performance of your choosing with preconfigured software already installed using the Amazon Web Service (AWS) suite of tools. You can use this for use cases that span when you need limited access to high end computing thru when you give your collaborators access to preconfigured computers to look at their data.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

    求助全文

  • 文章类型: Journal Article
    The Seven Bridges Cancer Genomics Cloud (CGC) is part of the National Cancer Institute Cloud Resource project, which was created to explore the paradigm of co-locating massive datasets with the computational resources to analyze them. The CGC was designed to allow researchers to easily find the data they need and analyze it with robust applications in a scalable and reproducible fashion. To enable this, individual tools are packaged within Docker containers and described by the Common Workflow Language (CWL), an emerging standard for enabling reproducible data analysis. On the CGC, researchers can deploy individual tools and customize massive workflows by chaining together tools. Here, we discuss a case study in which RNA sequencing data is analyzed with different methods and compared on the Seven Bridges CGC. We highlight best practices for designing command line tools, Docker containers, and CWL descriptions to enable massively parallelized and reproducible biomedical computation with cloud resources.
    导出

    更多引用

    收藏

    翻译标题摘要

    我要上传

       PDF(Sci-hub)

公众号