Feature
|
Function
|
Benefit
|
Heterogeneous
support |
Does
anything anywhere. |
No
need to change your existing database, operating system, hardware,
file systems, RDBMSes, etceteras. |
Automation |
Processing
daemons look for work to be done and automatically initiates processing |
Provides
automated processing on a single computer, within a site, or across
the world. |
Restartable
Processing |
Restarts
processes and restores connections as configured by administrator. |
Restarts
processes that may have failed, interrupted, or isn't really ready
to run. |
Defined
Workflow |
Relationships
between processes may be explicitly declared. |
Creates
a work-flow through parent-child relationships and their processes. |
Work-load
Distribution |
Processes
may be assigned to groups and daemons. |
Permits
load balancing and configures particular work to particular systems. |
Rugged
Survivalism |
Detaches
processes from the parent. |
Allows
processing to continue when a daemon is shut down, or the originating
object isn't found. |
DemandEngine
and EagerEngine |
Looks
to common meta-data repositories to find work. |
Allows
the environment to be physically distributed and logically joined.
When
resources are available the client looks for work rather than having
a coordinator looking for a machine that is free.
|
Scientific
Defensibility |
Tracks
the generation history, or lineage, of your scientific objects. |
Never
again struggle to recall just how a particular result was obtained.
Exact
details of how each object was created are preserved.
Enables
easy repeatability of processing steps with single changes.
Illuminates
and confirms findings.
|
Computational
Unification |
Incorporate
hardware, software, people, data and knowledge into one system. |
Users
unify what hey already have. |
|
|
|
Publisher |
Provides
connectivity between instances of data and meta-data. |
Sites
collaborate to preserve data and meta-data permitting an uninterrupted
flow from data source, through all intermediate processing steps
to final use.
Permits
you to share and track results automatically, or works-in-progress,
with anyone (collaborators or the public) and provides controls
and tracking so you know what is going on.
On
demand, on a schedule, or as things are created.
|
DbCryptor |
Provides
secure connection services between client applications and services
resources by providing flexible connectivity capabilities on the
target end.
Permits
authorized piercing of firewalls and gateways, and provides further
redirection of a connection to any destination within a private
network.
May
also be used in other applications which require secure transport
between components that communicate using the TCP/IP port mechanism.
Such applications are widespread and include uses such as video
conferences.
|
Secure,
encrypted, point-to-point, destination-end control and on-the-fly
communications.
The
target node does not have to be the final destination of the connection,
though encryption will end at that point in the network connection.
Can
be used to augment existing network security strategies such as
VPN by filling a need where VPNs may be inappropriate or impossible
to configure.
|
SQL
Translation Services |
Provides
users the ability to write applications once and have them operate
against any modern RDBMS engine, despite the fact that all databases
have their own unique dialects. |
Permits
migration of applications from one database vendor to another, or
can enable write-once-run-anywhere applications.
Universal
journaling services to all RDBMSes including logging and reloading.
DMB/DDL,
BLOB/CLOB Support
As
of this writing, certifications exist for Oracle, Postgres, Informix,
Sybase and DB2. Others are pending, so contact us for current information.
|
Named
Database Connections |
Named
connections are described in the file system and are protected by
file system access privileges. |
Provides
simplified database access and isolation of sensitive configuration
data from unprivileged users.
Recognizes
users TRUE identities based on privileges and permissions.
|
Java
API
55,000 lines of Java including 1,100 public methods |
A collection
of Java classes and methods written to make the job of implementing
applications easier.
Utilizes
the very latest concepts in threat detection and avoidance, including
using multiple, simultaneous methods of user identification and
system identification to reduce risk.
|
Write
commands, processes, or any form of an application that can speak
to every implementation of the STDB database schema.
Distributed
Processing Features enabling remote management of processes and
daemons with digitally signed commands for security.
Interoperability
support, enabling your code to run unchanged against nearly any
Database.
System
managers can setup required logging which cannot be turned off by
users.
Avoids
IP spoofing
|
Archivist |
Object
archiving suite |
Recognizes
duplicate copies as distinct from named objects (object oriented)
found scattered throughout an environment.
Configurable
duplications allows administrators to choose how many copies of
objects they want where and when.
Not
intended to replace platform specific disk backup and recovery tools,
but rather to augment them with a capability of managing individual
objects through time.
Fully
distributed, multi-site architecture: Source files may come from
any network and may be stored on any network, with the meta-data
about them being available on a third system.
|
STJC |
Secures
the environment prior to calling C and Java applications |
Prevents
clever users from spoofing applications prior to execution including;
desktop tools (excel), Java-based GUI interfaces, interactive command
line access, batch processing and IDEs.
Secures
known vulnerabilities in environment variables such as PATH, CLASSPATH,
LD_LOAD_LIBRARY, and so on, and explicitly sets the variables before
calling application level programs.
Both
real and effective user-IDs are tracked
Calls
application's process ID (not available in Java)
|
The
BigSur System |
A
comprehensive environment for science, research, grid-computing, high-performance
computing and development enterprise management. |
Distributed
Processing System for "Grid" computing provides seamless
application access via ANY supported database. Any component (e.g.,
processes, objects, data, meta-data, etceteras) may exist on any
network-reachable node.
No
Node Limitation
Heterogeneous
Independence
Designed
to learn about the holdings of other systems to manage their data
and/or meta-data to automate collaborative access. Runs your processes
so you won't be embarrassed when you lose your key staff (intern,
grad student) and "forget" how.
Collects
and teaches processing functions useful to your discipline so you
can build a library of capabilities, accessible from anywhere and
runable by anybody to whom you grant permissions.
Confirms
to conventions and paradigms of the users (e.g., data-types, associative
relationships, processes, etceteras)
Scalable,
use as little capabilities as desired without being forced to use
unnecessary components or incorporate inter/intra/multi-disciplinary
environments/projects (virtual organizations).
Complete
data lineage from source to use and vice versa!
|
ScienceMaster |
A
system-management functional tool for The BigSur System in a
Graphical User Interface form. |
Great
for those who aren't comfortable with command-line-interface.
Manages:
Infrastructure (organizations, suites, people, computers), Processes
(process definitions, input parameters, output results), Objects
(individual or in sets, object data and/or meta-data), Relationships
(object to object, object to process and process to process), Databases
(DB access, logs, journaling), Security (individuals, objects, network,
database).
Provides
direct control of the Distributed Processing System (DPS).
|
Distributed
Processing |
Distributes
processing to the most appropriate host node(s). |
Any
network-reachable system can participate in performing work, even
over un-trusted networks.
Cost-effective
super-computing systems may be created using new computers, or any
existing systems, including lower valued, fully depreciated (scrapped)
nodes.
Joins
together a heterogeneous collection of systems.
|
DaemonMaster |
Manages
all the DPS daemons on a single system |
Provides
the administrator a means to manage processing on all systems, no
matter what node they are logged in on. |