Essays about: "Containerisation"

Showing result 1 - 5 of 7 essays containing the word Containerisation.

  1. 1. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE

  2. 2. Evaluation of using knowledge retention practices in a DevOps workflow

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Simon Jakobsson; Linnéa Ivansson; [2023]
    Keywords : DevOps; Knowledge loss; Knowledge retention; Developer turnover; Automation; Knowledge management; DevOps maturity model; Knowledge repositories; Continuous workflow;

    Abstract : This thesis explores applying DevOps practices to mitigate knowledge loss in project-based environments. In the context of high developer turnover, the study aims to implement a standardised DevOps workflow using automation and knowledge management. READ MORE

  3. 3. Towards Realistic Datasets forClassification of VPN Traffic : The Effects of Background Noise on Website Fingerprinting Attacks

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Christoffer Sandquist; Jon-Erik Ersson; [2023]
    Keywords : Data collection; Website fingerprinting; dataset; traffic analysis; VPN; encrypted traffic; machine learning; deep learning; network measurements; twitch; Datainsamling; Profilering av hemsidor; dataset; trafikanalys; VPN; krypterad trafik; maskininlärning; djupinlärning; nätverksmätningar; twitch;

    Abstract : Virtual Private Networks (VPNs) is a booming business with significant margins once a solid user base has been established and big VPN providers are putting considerable amounts of money into marketing. However, there exists Website Fingerprinting (WF) attacks that are able to correctly predict which website a user is visiting based on web traffic even though it is going through a VPN tunnel. READ MORE

  4. 4. Performance Evaluation of Kubernetes Autoscaling strategies on GKE clusters

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johanna Nilsen; [2023]
    Keywords : Cloud Computing; Containerisation; Kubernetes; Google Kubernetes Engine; Autoscaling; Horizontal Pod Autoscaling; Vertical Pod Autoscaling; Hybrid Pod Autoscaling; Molntjänster; Containerisering; Kubernetes; Google Kubernetes Engine; Autoskalning; Horisontell Pod-autoskalning; Vertikal Pod-autoskalning; Hybrid Pod-autoskalning;

    Abstract : Cloud computing and containerisation have experienced significant growth in recent years. With cloud providers requiring users to specify resource limits and requests, the need for performance and resource optimisation has emerged in the cloud computing domain. READ MORE

  5. 5. Comparing PLC, Software Containers and Edge Computing for future industrial use: a literature review

    University essay from Högskolan i Skövde/Institutionen för ingenjörsvetenskap

    Author : Mumthas Basem; [2022]
    Keywords : Programmable Logic Controller PLC ; Functional Block; Container Technology; Edge Computing; Fog Computing; Industrial Internet of Things IIoT ;

    Abstract : Industrial automation is critical in today's industry. The majority of new scientific and technological advancements are either enabling technologies or industrial automation application areas. In the past, the two main forms of control systems were distributed control systems (DCS) and programmable logic controllers (PLCs). READ MORE