Essays about: "cpu monitoring"
Showing result 1 - 5 of 38 essays containing the words cpu monitoring.
-
1. Comparative Analysis of Load Balancing in Cloud Platforms for an Online Bookstore Web Application using Apache Benchmark
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background :Cloud computing has transformed the landscape of application deploy-ment, offering on-demand access to compute resources, databases, and services viathe internet. This thesis explores the development of an innovative online book-storeweb application, harnessing the power of cloud infrastructure across AWS,Azure, andGCP. READ MORE
-
2. EDPM : An extension of EDPM - an embedded domain-specific language for performance monitoring C and C++ programs
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Performance monitoring of C/C++ programs has often been a tedious and straining process, where insufficient and complex tools/APIs are required. Performance monitoring tools and APIs tend to focus on ease of use or flexibility, but rarely both. READ MORE
-
3. Finding the Sweet Spot: Optimizing Kubernetes for Scalability and Resilience : A Comprehensive Study on Improving Resource Utilization and Performance in Containerized Environments.
University essay from Karlstads universitet/Fakulteten för hälsa, natur- och teknikvetenskap (from 2013); Karlstads universitet/Avdelningen för datavetenskapAbstract : Modern technology is rapidly and efficiently expanding, and by looking at the largest companies by market cap, one will find enterprises like Apple, Microsoft, Alphabet, and Meta. Given the complexity of modern software architecture, there arises a necessity for a software architecture that is both scalable and adaptable. READ MORE
-
4. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE
-
5. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE