Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

2020

Cloud computing

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 53

Full-Text Articles in Entire DC Network

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao Dec 2020

Performance Optimization Of Big Data Computing Workflows For Batch And Stream Data Processing In Multi-Clouds, Huiyan Cao

Dissertations

Workflow techniques have been widely used as a major computing solution in many science domains. With the rapid deployment of cloud infrastructures around the globe and the economic benefits of cloud-based computing and storage services, an increasing number of scientific workflows have migrated or are in active transition to clouds. As the scale of scientific applications continues to grow, it is now common to deploy various data- and network-intensive computing workflows such as serial computing workflows, MapReduce/Spark-based workflows, and Storm-based stream data processing workflows in multi-cloud environments, where inter-cloud data transfer oftentimes plays a significant role in both workflow performance …


Caee: Communication-Aware, Energy-Efficient Vm Placement Model For Multi-Tier Applications In Large Scale Cloud Data Centers, Soha Rawas, Ahmed Zekri Dec 2020

Caee: Communication-Aware, Energy-Efficient Vm Placement Model For Multi-Tier Applications In Large Scale Cloud Data Centers, Soha Rawas, Ahmed Zekri

BAU Journal - Science and Technology

the increasing demand for cloud computing services has led to the adoption of large-scale cloud data centers (DCs) to meet the user’s requirements. Efficiency and managing of such DCs have become a challenging problem. Consequently, energy-efficient solutions to optimize the whole DC energy consumption, optimize the application’s performance and reduce the cloud provider operational cost are crucial and needed. This paper addressed the problem of Virtual Machines (VMs) placement of multi-tier applications to maximize the compute resources utilization, minimize energy consumption, and reduce network traffic inside modern large-scale cloud DCs. The VM placement problem with communication dependencies among the VMs …


Pemanfaatan Teknologi Cloud Computing Dalam Reformasi Birokrasi Guna Mewujudkan Kejaksaan Yang Profesional, Komunikatif Dan Akuntabel, Rudi Pradisetia Sudirdja Dec 2020

Pemanfaatan Teknologi Cloud Computing Dalam Reformasi Birokrasi Guna Mewujudkan Kejaksaan Yang Profesional, Komunikatif Dan Akuntabel, Rudi Pradisetia Sudirdja

Jurnal Hukum & Pembangunan

Cloud computing is so populer and it has become a hot word in the tech world, especially in the era of industrial revolution 4.0 which requires speed, accuracy and precision in the business process. Cloud computing is a combination of the use of computer technology (computing) and Internet-based development (cloud), resulting in a model of processing activities, storage, software and other services provided as an integrated virtual source on an internet network. This paper examines the use of cloud computing in the implementation of bureaucratic reforms, improving the quality of prosecutors professionalism, and providing communicative and accountable public prosecutors. The …


Looking Towards The Sky: Cloud Computing From A Conceptual To An It Industry Game Changer, Jordan Bani Dec 2020

Looking Towards The Sky: Cloud Computing From A Conceptual To An It Industry Game Changer, Jordan Bani

Mountain Plains Journal of Business and Technology

Cloud computing is highly embraced and identified as one of the major innovations in the computing field in recent years. The main goals of this article, which is based on literature reviews and personal work experience, are to present an overview of the conceptual idea of cloud computing, the cloud computing delivery paradigms, common roles in cloud computing, the most mentioned advantages of adopting cloud computing in enterprise environments, the main criticisms facing cloud computing, and recommendations for ensuring the success of cloud computing implementation and adoption, in order to inform and educate business managers, IT managers, and higher education …


Secure Outsourced Computation On Encrypted Data, Asma Aloufi Dec 2020

Secure Outsourced Computation On Encrypted Data, Asma Aloufi

Theses

Homomorphic encryption (HE) is a promising cryptographic technique that supports computations on encrypted data without requiring decryption first. This ability allows sensitive data, such as genomic, financial, or location data, to be outsourced for evaluation in a resourceful third-party such as the cloud without compromising data privacy. Basic homomorphic primitives support addition and multiplication on ciphertexts. These primitives can be utilized to represent essential computations, such as logic gates, which subsequently can support more complex functions. We propose the construction of efficient cryptographic protocols as building blocks (e.g., equality, comparison, and counting) that are commonly used in data analytics and …


Cosacc: Cloud-Based Speed Advisory For Connected Vehicles In A Signalized Corridor, Hsien-Wen Deng Dec 2020

Cosacc: Cloud-Based Speed Advisory For Connected Vehicles In A Signalized Corridor, Hsien-Wen Deng

All Theses

The objective of this study is to assess the feasibility of cloud-based real-time connected vehicle (CV) applications. The author developed a cloud-based speed advisory application for CVs in a signalized corridor (COSACC) to achieve this objective. The contribution of this study is threefold. First, it introduced a serverless cloud computing architecture using Amazon Web Services (AWS) for real-time CV applications. Second, the author developed a real-time optimization-based speed advisory algorithm that is deployable in AWS. Third, this study utilized a cloud-in-the-loop simulation testbed using AWS and Simulation of Urban Mobility (SUMO), which is a microscopic traffic simulator. The author conducted …


Usage And Awareness Of Cloud Computing Applications By Library Professionals Of Sindh Province, Liaquat Ali Rahoo Nov 2020

Usage And Awareness Of Cloud Computing Applications By Library Professionals Of Sindh Province, Liaquat Ali Rahoo

Library Philosophy and Practice (e-journal)

The aim of the study is examine the usage and awareness level of cloud computing applications by library professionals of Sindh province. Methods- This study was quantitative survey based. The population of the study was library professionals who are working in different types of libraries likewise academic, special and community libraries of Sindh province. Sampling technique was random simple sample size was 165 library professionals (library assistant, assistant librarian, deputy librarian, librarian. Questionnaire was prepared in google form and distributed by email to selected respondents. Results- The result declared that knowledge and awareness of library professionals regarding cloud …


Library Management Software: A Comparative Study Of Cloud Service And In-House Software Implementation At Upsa-Ghana, Amy P. A. Asimah, Sebastian H. Ofoe Oct 2020

Library Management Software: A Comparative Study Of Cloud Service And In-House Software Implementation At Upsa-Ghana, Amy P. A. Asimah, Sebastian H. Ofoe

Library Philosophy and Practice (e-journal)

This study looks at Library Management Software, a comparative study of Cloud Service and In-house Software implementation at UPSA-Ghana with the help of key performance indicators. The purpose of this study is to identify the security effects of Cloud Software as a Service (SaaS), the benefits of Cloud Service as compared to In-house Software implementation within the context of Technology Acceptance Model (TAM). The study uses self-administered questionnaires to collect data and Statistical Package for the Social Sciences (SPSS) tool to analyze data collected from 52 respondents from UPSA. The results indicated that the users of the In-house library system …


Attribute-Based Fine-Grained Access Control For Outscored Private Set Intersection Computation, Mohammad Ali, Mohajeri Javad, Mohammad-Reza Sadeghi, Ximeng Liu Oct 2020

Attribute-Based Fine-Grained Access Control For Outscored Private Set Intersection Computation, Mohammad Ali, Mohajeri Javad, Mohammad-Reza Sadeghi, Ximeng Liu

Research Collection School Of Computing and Information Systems

Private set intersection (PSI) is a fundamental cryptographic protocol which has a wide range of applications. It enables two clients to compute the intersection of their private datasets without revealing non-matching elements. The advent of cloud computing drives the ambition to reduce computation and data management overhead by outsourcing such computations. However, since the cloud is not trustworthy, some cryptographic methods should be applied to maintain the confidentiality of datasets. But, in doing so, data owners may be excluded from access control on their outsourced datasets. Therefore, to control access rights and to interact with authorized users, they have to …


Software For Monitoring Forest Change In Tropical West Africa Using Satellite Remote Sensing, Michael Wimberly Sep 2020

Software For Monitoring Forest Change In Tropical West Africa Using Satellite Remote Sensing, Michael Wimberly

International Congress on Environmental Modelling and Software

Satellite remote sensing is an essential source of data on forest landscape change that is necessary for estimating carbon stocks, assessing biodiversity, and developing conservation plans to sustain ecosystem services. The Upper Guinean Forest region of West Africa, a global biodiversity hotspot, currently lacks timely, consistent, and accurate long-term forest monitoring systems suitable for decision support. Major limitations include data gaps due to frequent cloud cover and limited satellite coverage. To address these limitations, we developed the West African Forest Degradation Data System (WAForDD) to use all available Landsat imagery to monitor forest change in the tropical forest zone of …


Software For Monitoring Forest Change In Tropical West Africa Using Satellite Remote Sensing, Michael Wimberly Sep 2020

Software For Monitoring Forest Change In Tropical West Africa Using Satellite Remote Sensing, Michael Wimberly

International Congress on Environmental Modelling and Software

Satellite remote sensing is an essential source of data on forest landscape change that is necessary for estimating carbon stocks, assessing biodiversity, and developing conservation plans to sustain ecosystem services. The Upper Guinean Forest region of West Africa, a global biodiversity hotspot, currently lacks timely, consistent, and accurate long-term forest monitoring systems suitable for decision support. Major limitations include data gaps due to frequent cloud cover and limited satellite coverage. To address these limitations, we developed the West African Forest Degradation Data System (WAForDD) to use all available Landsat imagery to monitor forest change in the tropical forest zone of …


Advances In The Science And Technology Of Simulating Water, Nutrient, Soil And Plant Interactions And Dynamics In Space And Time, Tim Green Sep 2020

Advances In The Science And Technology Of Simulating Water, Nutrient, Soil And Plant Interactions And Dynamics In Space And Time, Tim Green

International Congress on Environmental Modelling and Software

The Agricultural Ecosystems Services (AgES) distributed watershed model is being developed as a component-based model for continuous daily simulation. Current case studies use AgES to simulate space-time patterns of soil moisture and infrequent runoff events in a dryland field-scale watershed in northern Colorado, contributions of irrigated agriculture to a mixed-landuse watershed near metropolitan Denver, and tile drainage contributing to high nitrate loads in Iowa, USA. These watersheds (56 ha to 581 km2) provide comparative studies to address model complexity across various scales with different types and amounts of data. Key advances include enhanced process simulation (1) coupling plant uptake of …


Efficient Fine-Grained Data Sharing Mechanism For Electronic Medical Record Systems With Mobile Devices, Hui Ma, Rui Zhang, Guomin Yang, Zishuai Zong, Kai He, Yuting Xiao Sep 2020

Efficient Fine-Grained Data Sharing Mechanism For Electronic Medical Record Systems With Mobile Devices, Hui Ma, Rui Zhang, Guomin Yang, Zishuai Zong, Kai He, Yuting Xiao

Research Collection School Of Computing and Information Systems

Sharing digital medical records on public cloud storage via mobile devices facilitates patients (doctors) to get (offer) medical treatment of high quality and efficiency. However, challenges such as data privacy protection, flexible data sharing, efficient authority delegation, computation efficiency optimization, are remaining toward achieving practical fine-grained access control in the Electronic Medical Record (EMR) system. In this work, we propose an innovative access control model and a fine-grained data sharing mechanism for EMR, which simultaneously achieves the above-mentioned features and is suitable for resource-constrained mobile devices. In the model, complex computation is outsourced to public cloud servers, leaving almost no …


Attribute-Based Encryption For Cloud Computing Access Control: A Survey, Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng Sep 2020

Attribute-Based Encryption For Cloud Computing Access Control: A Survey, Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng

Research Collection School Of Computing and Information Systems

Attribute-based encryption (ABE) for cloud computing access control is reviewed in this article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the taxonomy, ABE schemes are assorted into key-policy ABE (KP-ABE) schemes, ciphertext-policy ABE (CP-ABE) schemes, anti-quantum ABE schemes, and generic constructions. In accordance with cryptographically functional features, CP-ABE is further divided into nine subcategories with regard to basic functionality, revocation, accountability, policy hiding, policy updating, multi-authority, hierarchy, offline computation, and outsourced computation. In addition, a systematical methodology for discussing and comparing existing ABE schemes is proposed. For KP-ABE and each type of CP-ABE, the corresponding …


Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan Aug 2020

Energy And Performance-Optimized Scheduling Of Tasks In Distributed Cloud And Edge Computing Systems, Haitao Yuan

Dissertations

Infrastructure resources in distributed cloud data centers (CDCs) are shared by heterogeneous applications in a high-performance and cost-effective way. Edge computing has emerged as a new paradigm to provide access to computing capacities in end devices. Yet it suffers from such problems as load imbalance, long scheduling time, and limited power of its edge nodes. Therefore, intelligent task scheduling in CDCs and edge nodes is critically important to construct energy-efficient cloud and edge computing systems. Current approaches cannot smartly minimize the total cost of CDCs, maximize their profit and improve quality of service (QoS) of tasks because of aperiodic arrival …


Towards Dynamic Vehicular Clouds, Aida Ghazizadeh Aug 2020

Towards Dynamic Vehicular Clouds, Aida Ghazizadeh

Computer Science Theses & Dissertations

Motivated by the success of the conventional cloud computing, Vehicular Clouds were introduced as a group of vehicles whose corporate computing, sensing, communication, and physical resources can be coordinated and dynamically allocated to authorized users. One of the attributes that set Vehicular Clouds apart from conventional clouds is resource volatility. As vehicles enter and leave the cloud, new computing resources become available while others depart, creating a volatile environment where the task of reasoning about fundamental performance metrics becomes very challenging. The goal of this thesis is to design an architecture and model for a dynamic Vehicular Cloud built on …


Qos-Aware Scheduling For Data Intensive Workflow, Wan Cong, Cuirong Wang, Wang Cong Jul 2020

Qos-Aware Scheduling For Data Intensive Workflow, Wan Cong, Cuirong Wang, Wang Cong

Journal of System Simulation

Abstract: The development of technology enables people to access resources from different data centers. Resource management and scheduling of applications, such as workflow, that are deployed on the cloud computing environment have already become a hot spot. A QoS-aware scheduling algorithm for data intensive workflow on multiple data center environment was proposed. Scheduling data intensive workflow on multiple data center environment has two characteristics: A large amount of data is distributed in different geographical locations, the process of data migration will consume a large amount of time and bandwidth; secondly, the data centers have different price and resources. Data migration …


Information Collaboration Model Of Cloud Computing Supply Chain Based On Multi-Agent, Wuxue Jiang, Xuanzi Hu, Minxia Liu, Yuqiang Chen Jul 2020

Information Collaboration Model Of Cloud Computing Supply Chain Based On Multi-Agent, Wuxue Jiang, Xuanzi Hu, Minxia Liu, Yuqiang Chen

Journal of System Simulation

Abstract: In order to improve the work efficiency of supply chain in cloud computing and avoid the risks of cloud computing, a cloud-based supply chain information coordination model was proposed. The model has two basic states which are online status and offline status, at online state the cloud computing center is responsible for coordination of the entire supply chain information, and at offline state each node continues to complete the transaction order through the history record and each node information in the cloud data center. Simulation based on Multi-agent shows that the order completion rate in offline status is …


A Novel Greedy Based Algorithm For Resource Allocation In Cloud Computing Environment, Vijendra Pratap Singh Jun 2020

A Novel Greedy Based Algorithm For Resource Allocation In Cloud Computing Environment, Vijendra Pratap Singh

Manipal Journal of Science and Technology

Resource allocation in a cloud computing environment means a mechanism to allocate different cloudlets to the available cloud resources on the basis of some criteria like cloudlets’ characteristics and/or requirements. It is one of the major challenges for cloud providers. Cloud providers have introduced many models for resource allocation. In this paper, we have proposed a greedy-based resource allocation algorithm. Here, first of all, the given cloudlets are classified into two categories: computational cloudlets and interactive cloudlets on the basis of some parameters. Next according to their category, they are allocated differently. The performance metrics of this newly proposed algorithm …


An Extended Framework Of Privacy-Preserving Computation With Flexible Access Control, Wenxiu Ding, Rui Hu, Zheng Yan, Xinren Qian, Robert H. Deng, Laurence T. Yang, Mianxiong Dong Jun 2020

An Extended Framework Of Privacy-Preserving Computation With Flexible Access Control, Wenxiu Ding, Rui Hu, Zheng Yan, Xinren Qian, Robert H. Deng, Laurence T. Yang, Mianxiong Dong

Research Collection School Of Computing and Information Systems

Cloud computing offers various services based on outsourced data by utilizing its huge volume of resources and great computation capability. However, it also makes users lose full control over their data. To avoid the leakage of user data privacy, encrypted data are preferred to be uploaded and stored in the cloud, which unfortunately complicates data analysis and access control. In particular, few existing works consider the fine-grained access control over the computational results from ciphertexts. Though our previous work proposed a framework to support several basic computations (such as addition, multiplication and comparison) with flexible access control, privacy-preserving division calculations …


Editing-Enabled Signatures: A New Tool For Editing Authenticated Data, Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng Jun 2020

Editing-Enabled Signatures: A New Tool For Editing Authenticated Data, Binanda Sengupta, Yingjiu Li, Yangguang Tian, Robert H. Deng

Research Collection School Of Computing and Information Systems

Data authentication primarily serves as a tool to achieve data integrity and source authentication. However, traditional data authentication does not fit well where an intermediate entity (editor) is required to modify the authenticated data provided by the source/data owner before sending the data to other recipients. To ask the data owner for authenticating each modified data can lead to higher communication overhead. In this article, we introduce the notion of editing-enabled signatures where the data owner can choose any set of modification operations applicable on the data and still can restrict any possibly untrusted editor to authenticate the data modified …


Performance Modeling Of Cryptographic Service System Virtualization Based On Issm, Songhui Guo, Qingbao Li, Sun Lei, Xuerong Gong, Tianchi Yang Jun 2020

Performance Modeling Of Cryptographic Service System Virtualization Based On Issm, Songhui Guo, Qingbao Li, Sun Lei, Xuerong Gong, Tianchi Yang

Journal of System Simulation

Abstract: The complicated architecture of cryptographic service system virtualization raised the difficulty of performance modeling. A performance modeling approach based on ISSMs was proposed. The approach divided the execution process into two stages, host preprocessing and arithmetic-module calculating, and built two sub-models based on queuing theory. On this basis, the effectiveness of this approach was verified. The results show that this method can analyze the impacts on system performance caused by task arrival rates, host and cryptographic card configurations quantitatively, and also be helpful for providing reasonable solutions to deploy virtualized cryptographic service system on cloud computing platforms.


Load Balancing In Cloud Computing, Snehal Dhumal May 2020

Load Balancing In Cloud Computing, Snehal Dhumal

Master's Projects

Cloud computing is one of the top trending technologies which primarily focuses on the end user’s use cases. The service provider needs to provide services to many clients. These increasing number of requests from the clients are giving rise to the new inventions in the load scheduling algorithms. There are different scheduling algorithms which are already present in the cloud computing, and some of them includes the Shortest Job First (SJF), First Come First Serve (FCFS), Round Robin (RR) etc. Though there are different parameters to consider when load balancing in cloud computing, makespan (time difference between start time of …


Ml-Medic: A Preliminary Study Of An Interactive Visual Analysis Tool Facilitating Clinical Applications Of Machine Learning For Precision Medicine, Laura Stevens, David Kao, Jennifer Hall, Carsten Görg, Kaitlyn Abdo, Erik Linstead May 2020

Ml-Medic: A Preliminary Study Of An Interactive Visual Analysis Tool Facilitating Clinical Applications Of Machine Learning For Precision Medicine, Laura Stevens, David Kao, Jennifer Hall, Carsten Görg, Kaitlyn Abdo, Erik Linstead

Engineering Faculty Articles and Research

Accessible interactive tools that integrate machine learning methods with clinical research and reduce the programming experience required are needed to move science forward. Here, we present Machine Learning for Medical Exploration and Data-Inspired Care (ML-MEDIC), a point-and-click, interactive tool with a visual interface for facilitating machine learning and statistical analyses in clinical research. We deployed ML-MEDIC in the American Heart Association (AHA) Precision Medicine Platform to provide secure internet access and facilitate collaboration. ML-MEDIC’s efficacy for facilitating the adoption of machine learning was evaluated through two case studies in collaboration with clinical domain experts. A domain expert review was also …


A Fully Distributed Hierarchical Attribute-Based Encryption Scheme, Ali Mohammad, Javad Mohajeri, Ximeng Liu, Ximeng Liu May 2020

A Fully Distributed Hierarchical Attribute-Based Encryption Scheme, Ali Mohammad, Javad Mohajeri, Ximeng Liu, Ximeng Liu

Research Collection School Of Computing and Information Systems

With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and used in several cloud storage systems. However, scalability and flexibility in key delegation and user revocation mechanisms are primary issues in ABE systems. In this paper, we introduce the concept of a fully distributed revocable ciphertext-policy hierarchical ABE (FDR-CP-HABE) and design the first FDR-CP-HABE scheme. Our scheme offers a high level of flexibility and scalability in the key …


A 2020 Perspective On "Client Risk Informedness In Brokered Cloud Services: An Experimental Pricing Study", Di Shang, Robert J. Kauffman May 2020

A 2020 Perspective On "Client Risk Informedness In Brokered Cloud Services: An Experimental Pricing Study", Di Shang, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

Cloud computing and the cloud services market have advanced in the past ten years. Cloud services now include most information technology (IT) services from fundamental computing services to more cutting- edge artificial intelligence (AI) services. Accordingly, opportunities have emerged for research on the design of new market features to improve the cloud services market to benefit providers and users. Based on our observation of the recent development of cloud services, in this short research commentary, we share our agenda for future studies of this important sector of IT services.


Awareness Of Vtu Consortium And Cloud-Based Online Resources In The Vtu Engineering College Libraries, C T Kantharaja Mr., V Bharathi Dr. Apr 2020

Awareness Of Vtu Consortium And Cloud-Based Online Resources In The Vtu Engineering College Libraries, C T Kantharaja Mr., V Bharathi Dr.

Library Philosophy and Practice (e-journal)

Modern academic libraries should well be equipped with online resources along with print resources. Libraries are facing a transition period from print to electronic. The younger generation prefers to refer to the digital form of resources quickly. VTU Consortium is a blessing for readers, who are studying/working in VTU affiliated colleges. To meet the industrial requirements, one who updates his/her knowledge up to global and industrial standards. It can be achieved only by referring to current journals. VTU consortium has given that chance to library users to access world-class eJournals and eBooks on their campuses just by clicking the mouse. …


Csci 49378: Final Project Assignment: Distributed Systems And Cloud Computing, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Final Project Assignment: Distributed Systems And Cloud Computing, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Final Project Assignment for the course: "CSCI 49378: Intro to Distributed Systems and Cloud Computing" delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 10: Cloud Storage And Databases Ii, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 10: Cloud Storage And Databases Ii, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Storage and Databases II" (Week Ten) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.


Csci 49378: Lecture 7: Cloud Systems And Infrastructures I, Bonan Liu, Nyc Tech-In-Residence Corps Apr 2020

Csci 49378: Lecture 7: Cloud Systems And Infrastructures I, Bonan Liu, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing - "Cloud Systems and Infrastructures I" (Week Seven) delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.