Papers by Fayyaz Khalid

Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, commu... more Modern research emphasizes Pervasive Computing change faces, learning cultures, structures, communications, intellectual properties, information securities, data presentations and web displays to make attraction for human interaction. Pervasive systems have a broad range of applications but it is relatively challenging for pervasive applications to meet emergence into existing physical environment and newly built structure requirements. Due to their interaction to gather information and change the environment via activating devices independently is highlighted. Security of the pervasive devices and applications which control our activities has primary importance and will be destroyed, if the pervasive system operations are not secure. There is a need to improve the security measures for data to travel rapidly, unbroken, unchanged and invisible by deceptive recipients. Pervasive Computing allows users to get information and services access anytime and anywhere but need to discuss issues and solutions to deliver secure information with privacy and trust. Possible solutions for these challenges of Pervasive Computing interaction between human are emphasized. A collection of papers and articles have been collected in order to investigate the previous study of Pervasive Computing interaction and its challenges. Is it possible for us to understand what the scientific world will be close to generate new avenues? Expectations of future bring new openings for user interaction with systems, data, information and the environments in which they live, work and play.
IJCSIS Papers by Fayyaz Khalid

The concept of Desktop virtualization was originated with Terminal Services, almost twenty five y... more The concept of Desktop virtualization was originated with Terminal Services, almost twenty five years ago but it gained a considerable popularity in last few years. With the expansion in global IT infrastructure and computational industry, companies were seriously struggling for cost effective and affordable computational solutions and PC infrastructure. Desktop virtualization technology filled the gap and now it could be seen anywhere on the globe. It allows end users to share the desktop and applications without being tied down to a specific hardware device either local or remote terminals. Companies and institutions are adopting it as a low-cost alternative of PC Infrastructure because it also allows IT departments to reduce management and support costs, along with capital expenses for desktop hardware. In this paper we will describe the desktop virtualization and its different model. After the complete understanding of desktop virtualization we shall discuss benefits and the challenges to adopt the desktop virtualization. Punjab IT labs project and N computing (a cutting edge technology partner) will be the part of this paper as a case study for the implementation of the desktop virtualization.

In disasters it is hard to provide the different routine services that are provided as usual in o... more In disasters it is hard to provide the different routine services that are provided as usual in our daily routine life, because when disaster event occurs a big problem come in front of us is the loss of our big and critical data.Storage and protection of such data is very critical and inevitable in such conditions. Now day's researchers are trying to introduce such mechanisms that can hold and provide such facility in disaster conditions. Cloud computing is self-heal, anti-fragile and resilient platform that controls and handles the problems of data storage during disasters. In this paper we shall explain how cloud stores and retrieves data in minimum possible time along with the option of security, fault tolerance and scalability during disasters. Cloud provides different services. Among of them Block Storage is an essential component of cloud that is used for the storage of data used by Virtual Machines VMs. These machines are further used to provide the services instead of being physical machines thus by lowering infrastructural and operational costs for any organization and in terms of redundancy, backup and fault tolerance. Block storage is efficiently used in enterprise clouds to manage large scale virtual machines and their storage patterns during disasters. In this paper, we are using block storage mechanism to setup our virtual machines in disasters, keep backup of our preinstalled servers, data stored in big arrays of disks and other critical data that might be in the form of images or multimedia content.

The concept of Desktop virtualization was originated with Terminal Services, almost twenty five y... more The concept of Desktop virtualization was originated with Terminal Services, almost twenty five years ago but it gained a considerable popularity in last few years. With the expansion in global IT infrastructure and computational industry, companies were seriouslystruggling for cost effective and affordable computational solutions and PC infrastructure. Desktop virtualization technology filled the gap and now itcould be seen anywhereon the globe. It allowsend users to share the desktop and applications without being tied down to a specific hardware device either local or remote terminals. Companies and institutions are adopting it as a low-cost alternative of PC Infrastructure because it also allows IT departments to reducemanagement and support costs, along with capital expenses for desktop hardware. In this paper we shall describe the desktop virtualization and its different model. After the complete understanding of desktop virtualization we shall discuss benefits and the challenges to adopt the desktop virtualization.Punjab IT labs project and N computing (a cutting edge technology partner) will be the part of this paper as a case study for the implementation of the desktop virtualization.
Uploads
Papers by Fayyaz Khalid
IJCSIS Papers by Fayyaz Khalid