Contrail (software)

Last updated
Contrail
Stable release
1.3 / October 7, 2013 (2013-10-07)
Written in Bash, Java, XML, Python
Operating system XtreemOS, Linux, Debian, Ubuntu
Type Cloud computing
License BSD, Apache License 2.0
Website contrail-project.eu

Contrail was a cloud federation computing project that ran from 1 October 2010 until 31 January 2014. [1] Contrail produced open-source cloud stack software including Security, PaaS components, Distributed file system, Application Lifecycle management middleware, and SLA Management. Contrail supports OVF standard and runs on OpenStack and OpenNebula. Contrail software is a full IaaS + PaaS Cloud stack ready to implement Cloud Federations.

The most recent release is version 1.3, allowing:

Contrail is partially funded by the FP7 Programme of the European Commission under Grant Agreement FP7-ICT-257438. [10]

Contrail also allows virtualization, alongside Infrastructure-as-a-Service, Platform-as-a-Service. and Hybrid clouds.

Related Research Articles

<span class="mw-page-title-main">Prince Harry, Duke of Sussex</span> Member of the British royal family (born 1984)

Prince Harry, Duke of Sussex,, is a member of the British royal family. As the younger son of King Charles III and Diana, Princess of Wales, Harry is fifth in the line of succession to the British throne.

Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information. It also involves actions intended to reduce the adverse impacts of such incidents. Protected information may take any form, e.g., electronic or physical, tangible, or intangible. Information security's primary focus is the balanced protection of data confidentiality, integrity, and availability while maintaining a focus on efficient policy implementation, all without hampering organization productivity. This is largely achieved through a structured risk management process that involves:

<span class="mw-page-title-main">Pope John Paul II</span> Head of the Catholic Church from 1978 to 2005

Pope John Paul II was head of the Catholic Church and sovereign of the Vatican City State from 1978 until his death in 2005.

Speech recognition is an interdisciplinary subfield of computer science and computational linguistics that develops methodologies and technologies that enable the recognition and translation of spoken language into text by computers. It is also known as automatic speech recognition (ASR), computer speech recognition or speech to text (STT). It incorporates knowledge and research in the computer science, linguistics and computer engineering fields. The reverse process is speech synthesis.

<span class="mw-page-title-main">Text messaging</span> Act of typing and sending a brief, digital message

Text messaging, or texting, is the act of composing and sending electronic messages, typically consisting of alphabetic and numeric characters, between two or more users of mobile devices, desktops/laptops, or another type of compatible computer. Text messages may be sent over a cellular network or may also be sent via satellite or Internet connection.

<span class="mw-page-title-main">Social network analysis</span> Analysis of social structures using network and graph theory

Social network analysis (SNA) is the process of investigating social structures through the use of networks and graph theory. It characterizes networked structures in terms of nodes and the ties, edges, or links that connect them. Examples of social structures commonly visualized through social network analysis include social media networks, meme spread, information circulation, friendship and acquaintance networks, peer learner networks, business networks, knowledge networks, difficult working relationships, collaboration graphs, kinship, disease transmission, and sexual relationships. These networks are often visualized through sociograms in which nodes are represented as points and ties are represented as lines. These visualizations provide a means of qualitatively assessing networks by varying the visual representation of their nodes and edges to reflect attributes of interest.

<span class="mw-page-title-main">Anggun</span> Indonesian singer-songwriter (born 1974)

Anggun Cipta Sasmi is an Indonesian and French singer, songwriter, and television personality. Born in Jakarta, she began performing at the age of seven and recorded a children's album two years later. She rose to fame in 1989 as a teenage rock star and by 1993 she had released five Indonesian-language studio albums. Rolling Stone listed her single "Mimpi" as one of the 150 Greatest Indonesian Songs of All Time.

<span class="mw-page-title-main">AC Monza</span> Association football club in Monza, Italy

Associazione Calcio Monza is a professional football club based in Monza, Lombardy, Italy. The team plays in the Serie A, the first tier of Italian football, following promotion in the 2021–22 Serie B season.

<span class="mw-page-title-main">April 1978</span> Month of 1978

The following events occurred in April 1978:

<span class="mw-page-title-main">Electronic cigarette</span> Device that vaporizes a liquid nicotine solution for inhalation

An electronic cigarette (e-cigarette) or vape is a device that simulates tobacco smoking. It consists of an atomizer, a power source such as a battery, and a container such as a cartridge or tank filled with liquid. Instead of smoke, the user inhales vapor. As such, using an e-cigarette is often called "vaping". The atomizer is a heating element that vaporizes a liquid solution called e-liquid, which quickly cools into an aerosol of tiny droplets, vapor and air. E-cigarettes are activated by taking a puff or pressing a button. Some look like traditional cigarettes, and most kinds are reusable. The vapor mainly comprises propylene glycol and/or glycerin, usually with nicotine and flavoring. Its exact composition varies, and depends on several things including user behavior.

Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

<span class="mw-page-title-main">Lac-Mégantic rail disaster</span> 2013 oil train crash in Québec, Canada

The Lac-Mégantic rail disaster occurred in the town of Lac-Mégantic, Quebec, Canada, on July 6, 2013, at approximately 1:14 a.m. EDT, when an unattended 73-car Montreal, Maine and Atlantic Railway (MMA) freight train carrying Bakken Formation crude oil rolled down a 1.2% grade from Nantes and derailed downtown, resulting in the explosion and fire of multiple tank cars. Forty-seven people were killed. More than thirty buildings in Lac-Mégantic's town centre were destroyed, and all but three of the thirty-nine remaining buildings had to be demolished due to petroleum contamination. Initial newspaper reports described a 1 km (0.6-mile) blast radius.

<span class="mw-page-title-main">Applications of 3D printing</span>

In recent years, 3D printing has developed significantly and can now perform crucial roles in many applications, with the most common applications being manufacturing, medicine, architecture, custom art and design, and can vary from fully functional to purely aesthetic applications.

Data center management is the collection of tasks performed by those responsible for managing ongoing operation of a data center. This includes Business service management and planning for the future.

2022 in film is an overview of events, including the highest-grossing films, award ceremonies, critics' lists of the best films of 2022, festivals, a list of country-specific lists of films released, and notable deaths.

References

  1. Cascella, Roberto; Morin, Christine; Harsh, Piyush; Jegou, Yvon. "Contrail: a reliable and trustworthy cloud platform" (PDF). In Proceedings of the 1st European Workshop on Dependable Cloud Computing, P. 6. ACM, 2012. Retrieved 30 October 2014.
  2. Carlini, Emanuele; Coppola, Massimo; Dazzi, Patrizio; Ricci, Laura; Righetti, Giacomo. "Cloud federations in contrail" (PDF). Euro-Par 2011: Parallel Processing Workshops. Springer Berlin Heidelberg, 2012.: 159–168. Retrieved 30 October 2014.
  3. Coppola, Massimo; Dazzi, Patrizio; Lazouski, Aliaksandr; Martinelli, Fabio; Mori, Paolo; Jensen, Jens; Johnson, Ian; Kershaw, Philip (2012). "The Contrail approach to cloud federations" (PDF). In Proceedings of the International Symposium on Grids and Clouds (ISGC'12). 2012: 19. Bibcode:2012isgc.sympE..19C. doi: 10.22323/1.153.0019 .
  4. Cascella, Roberto G.; Blasi, Lorenzo; Jegou, Yvon; Coppola, Massimo; Morin, Christine (2013). "Contrail: Distributed Application Deployment under SLA in Federated Heterogeneous Clouds". The Future Internet. Lecture Notes in Computer Science. Vol. 7858. pp. 91–103. doi: 10.1007/978-3-642-38082-2_8 . ISBN   978-3-642-38081-5.
  5. Blasi, Lorenzo; Jensen, Jens; Ziegler, Wolfgang (2014). "Expressing Quality of Service and Protection Using Federation-Level Service Level Agreement". Euro-Par 2013: Parallel Processing Workshops. Lecture Notes in Computer Science. Vol. 8374. pp. 146–156. doi:10.1007/978-3-642-54420-0_15. ISBN   978-3-642-54419-4.
  6. Anastasi, Gaetano F.; Carlini, Emanuele; Coppola, Massimo; Dazzi, Patrizio; Lazouski, Aliaksandr; Martinelli, Fabio; Mancini, Gaetano; Mori, Paolo (2014). "Usage Control in Cloud Federations". 2014 IEEE International Conference on Cloud Engineering. pp. 141–146. doi:10.1109/IC2E.2014.58. ISBN   978-1-4799-3766-0. S2CID   53696.
  7. Kershaw, Philip; Jensen, Jens; Stephens, Ag; van Engen, Willem (2013). "Exploiting OAuth 2.0: from User Delegation for OGC Services to a Generic Federation-as-a-Service Solution for Federated Identity Management". In EGU General Assembly Conference Abstracts. 15: EGU2013–10841. Bibcode:2013EGUGA..1510841K.
  8. Harsh, Piyush; Jegou, Yvon; Cascella, Roberto G.; Morin, Christine. "Contrail virtual execution platform challenges in being part of a cloud federation" (PDF). Retrieved 30 October 2014.
  9. Jégou, Yvon; Harsh, Piyush; Cascella, Roberto G.; Dudouet, Florian; Morin, Christine. "Managing OVF applications under SLA constraints on contrail virtual execution platform" (PDF). Retrieved 30 October 2014.
  10. Versweyveld, Leslie (30 October 2012). "The Contrail project is proud to present its first complete set of interoperable Cloud federation tools". isgtw.org. Archived from the original on 17 October 2013. Retrieved 17 October 2013.