Essays about: "Moln"
Showing result 1 - 5 of 123 essays containing the word Moln.
-
1. Performance Benchmarking and Cost Analysis of Machine Learning Techniques : An Investigation into Traditional and State-Of-The-Art Models in Business Operations
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Eftersom samhället blir allt mer datadrivet revolutionerar användningen av AI och maskininlärning sättet företag fungerar och utvecklas på. Denna studie utforskar användningen av AI, Big Data och Natural Language Processing (NLP) för att förbättra affärsverksamhet och intelligens i företag. READ MORE
-
2. Cloud Computing Pricing and Deployment Efforts : Navigating Cloud Computing Pricing and Deployment Efforts: Exploring the Public-Private Landscape
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The expanding adoption of cloud computing services by businesses has transformed IT infrastructure and data management in the computing space. Cloud computing offers advantages such as availability, scalability, and cost-effectiveness, making it a favored choice for businesses of all sizes. READ MORE
-
3. Performance of message brokers in event-driven architecture: Amazon SNS/SQS vs Apache Kafka
University essay from KTH/Hälsoinformatik och logistikAbstract : Microservice architecture, which involves breaking down applications into smaller and loosely coupled components, is becoming increasingly common in the development of modern systems. Connections between these components can be established in various ways. READ MORE
-
4. High-Performing Cloud Native SW Using Key-Value Storage or Database for Externalized States
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : To meet the demands of 5G and what comes after, telecommunications companies will need to replace their old embedded systems with new technology. One such solution could be to develop cloud-native applications that offer many benefits but are less reliable than embedded systems. READ MORE
-
5. Securing Sensitive Data in the Cloud: A New Era of Security Through Zero Trust Principles
University essay from KTH/Hälsoinformatik och logistikAbstract : The goal of this report is to examine how traditional security systems are structured and see their shortcomings, and from there propose how a new system can be built to secure sensitive data. The proposed approach is a new architecture called Zero Trust, which means implementing security at the design of the system and providing minimal access to users to perform their tasks. READ MORE