Essays about: "Configuration Management"
Showing result 16 - 20 of 232 essays containing the words Configuration Management.
-
16. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
17. Techno-economic Assessment of Carbon Capture from Low Concentration Streams
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Investments in carbon capture from industrial emissions have been on the rise in recent years, having reached over $200 million in 2021 as compared to 2015’s $13 million. The Paris Agreement, signed by 196 parties globally in 2015, is purported to be the primary driver for this, with its ambitious goal of limiting global surface temperature rise to 1. READ MORE
-
18. A comparative analysis of log management solutions: ELK stack versus PLG stack
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Managing and analyzing large volumes of logs can be challenging, and a log management solution can effectively address this issue. However, selecting the right log management solution can be a daunting task, considering various factors such as desired features and the solution's efficiency in terms of storage and resource usage. READ MORE
-
19. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE
-
20. Impact of offtake mechanisms on wind turbine selection and design in North and Central Europe
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Wind power has become a major supplier of electricity in the European market in the last years. In 2020, 13% of electricity generated on the European continent was wind energy (onshore and offshore) and these shares are projected to increase in the next years due to reasons such as climate change and the energy security aspect. READ MORE