Essays about: "linux file system"
Showing result 1 - 5 of 17 essays containing the words linux file system.
-
1. Doc-Overdue – An Automated Configuration File State Finder for Debian Systems
University essay from Högskolan i Skövde/Institutionen för informationsteknologiAbstract : Configuration files are a vital part of any server setup. Knowing what configuration files have been manipulated is vital in knowing what services are running and how they are configured on a system. Changes made to these configuration files must be manually documented or collected using some automated documentation tool. READ MORE
-
2. Jails vs Docker : A performance comparison of different container technologies
University essay from Mittuniversitetet/Institutionen för data- och systemvetenskapAbstract : Virtualization is used extensively by Enterprise IT architecture and cloud computing, it is used to provide customers a part of their hardware resources as a service. Container technology is the new generation of virtualization and provides performance benefits due to less overhead. READ MORE
-
3. Enterprise Search for Pharmacometric Documents : A Feature and Performance Evaluation
University essay from Uppsala universitet/Institutionen för biologisk grundutbildningAbstract : Information retrieval within a company can be referred to as enterprise search. With the use of enterprise search, employees can find the information they need in company internal data. READ MORE
-
4. Designing a Scheduler for Cloud-Based FPGAs
University essay from Linköpings universitet/DatorteknikAbstract : The primary focus of this thesis has been to design a network packet scheduler for the 5G (fifth generation) network at Ericsson in Linköping, Sweden. Network packet scheduler manages in which sequences the packages in a network will be transmitted, and will put them in a queue accordingly. READ MORE
-
5. Application security for embedded systems
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : With the rise of Internet of Things (IoT) accessories such as network attached cameras, light bulbs and thermostats are all constantly connected to the Internet and security concerns must be taken seriously. If a bug exists in an application it could be hacked by a malicious adversary that then could harm the underlying system, leak information or attack other devices or networks. READ MORE