Essays about: "cloud solution"

Showing result 1 - 5 of 307 essays containing the words cloud solution.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Question-answering chatbot for Northvolt IT Support

    University essay from Uppsala universitet/Signaler och system

    Author : Daniel Hjelm; [2023]
    Keywords : Artificial intelligence; Chatbot; Natural language processing; Natural language understanding; Machine learning; Deep learning; Transformer; Question answering; Conversational agents; Conversational AI;

    Abstract : Northvolt is a Swedish battery manufacturing company that specializes in the production of sustainable lithium-ion batteries for electric vehicles and energy storage systems. Established in 2016, the company has experienced significant growth in recent years. READ MORE

  3. 3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  4. 4. Performance analysis: CNN model on smartphones versus on cloud : With focus on accuracy and execution time

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Stegmayr Klas; Johansson Edwin; [2023]
    Keywords : CNN; Deep learning; iOS; Core ML; CIFAR-10;

    Abstract : In the modern digital landscape, mobile devices serve as crucial data generators.Their usage spans from simple communication to various applications such as userbehavior analysis and intelligent applications. However, privacy concerns associatedwith data collection are persistent. READ MORE

  5. 5. Defining an Evaluation Model for Container Orchestration Operator Frameworks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : André Arnesson; Samuel Alberius; [2023]
    Keywords : container orchestration; cloud native application; operator; software framework; evaluation model; Technology and Engineering;

    Abstract : The growing complexity of cloud native applications has necessitated the intro- duction of operators to the container orchestration tools’ suite of components. Operators affords developers the ability to encode domain knowledge and make fine-grained controllers for their Kubernetes clusters, radically extending the range of feasible applications to host. READ MORE