Essays about: "cpu monitoring"

Showing result 1 - 5 of 38 essays containing the words cpu monitoring.

  1. 1. Comparative Analysis of Load Balancing in Cloud Platforms for an Online Bookstore Web Application using Apache Benchmark

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Srilekha Pothuganti; Malepiti Samanth; [2023]
    Keywords : Cloud computing; load balancing; virtual instances; and the Apache Benchmark Tool;

    Abstract : Background :Cloud computing has transformed the landscape of application deploy-ment, offering on-demand access to compute resources, databases, and services viathe internet. This thesis explores the development of an innovative online book-storeweb application, harnessing the power of cloud infrastructure across AWS,Azure, andGCP. READ MORE

  2. 2. EDPM : An extension of EDPM - an embedded domain-specific language for performance monitoring C and C++ programs

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : David Bosnjak; [2023]
    Keywords : EDPM; Dynamic Nesting; PAPI; LLVM; Libtooling; EDPM; Dynamisk Nestning; PAPI; LLVM; Libtooling;

    Abstract : Background. Performance monitoring of C/C++ programs has often been a tedious and straining process, where insufficient and complex tools/APIs are required. Performance monitoring tools and APIs tend to focus on ease of use or flexibility, but rarely both. READ MORE

  3. 3. Finding the Sweet Spot: Optimizing Kubernetes for Scalability and Resilience : A Comprehensive Study on Improving Resource Utilization and Performance in Containerized Environments.

    University essay from Karlstads universitet/Fakulteten för hälsa, natur- och teknikvetenskap (from 2013); Karlstads universitet/Avdelningen för datavetenskap

    Author : Adam Rör; [2023]
    Keywords : Kubernetes; Microservices; Containerization Technology; Virtualization; Minikube;

    Abstract : Modern technology is rapidly and efficiently expanding, and by looking at the largest companies by market cap, one will find enterprises like Apple, Microsoft, Alphabet, and Meta. Given the complexity of modern software architecture, there arises a necessity for a software architecture that is both scalable and adaptable. READ MORE

  4. 4. Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : SHIVAKUMAR YADAV JABBU; ANIRUDH SAI MADIRAJU; [2023]
    Keywords : Software Defined Networking; IP Spoofing; Flooding; DDoS Attacks; Data Plane; Mininet;

    Abstract : Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. READ MORE

  5. 5. Using ARM TrustZone for Secure Resource Monitoring of IoT Devices Running Contiki-NG

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nikolaos Georgiou; [2023]
    Keywords : ARM TrustZone; Internet Of Things; Trusted Execution Environment; Secure monitoring; Contiki-NG; ARM TrustZone; Internet Of Things; Trusted Execution Environment; Säker övervakning; Contiki-NG;

    Abstract : The rapid development of Internet of Things (IoT) devices has brought unparalleled convenience and efficiency to our daily lives. However, with this exponential growth comes the pressing need to address the critical security challenges posed by these interconnected devices. READ MORE