Essays about: "Software Configuration Management"
Showing result 1 - 5 of 60 essays containing the words Software Configuration Management.
-
1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
2. Harnessing Hydrogen and Batteries: Hybrid Energy Storage System for Versatile and Profitable Renewable Power Production
University essay from Lunds universitet/Industriell elektroteknik och automationAbstract : This thesis explores the integration of hydrogen and battery energy storage systems as a means to enhance the management of wind and solar power in the pursuit of a greener grid. The objective of the study is to identify the potential benefits and challenges associated with hybrid energy storage systems (HESS) and their role in renewable energy integration. READ MORE
-
3. Automating End Station Configuration: An Agile Approach to Time-Sensitive Networking
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Industries such as automotive and industrial automation are pushing the limits of networking technology. The Time-Sensitive Networking (TSN) standards offer a promising solution that can meet the demands of high-bandwidth applications with strict timing constraints, allowing time-critical traffic to coexist with other traffic. READ MORE
-
4. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
5. Automating Deployments of Trusted Execution Environments
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. READ MORE