Essays about: "moln"

Showing result 1 - 5 of 123 essays containing the word moln.

  1. 1. Performance Benchmarking and Cost Analysis of Machine Learning Techniques : An Investigation into Traditional and State-Of-The-Art Models in Business Operations

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jacob Lundgren; Sam Taheri; [2023]
    Keywords : Artificial Intelligence AI ; Machine Learning; Big Data; Natural Language Processing NLP ; Pre-Trained BERT; Fine-Tuned BERT; TF-IDF; Logistic Regression; Support Vector Machine SVM ; Cloud GPU; Operating Costs; Performance Efficiency; Business Intelligence;

    Abstract : Eftersom samhället blir allt mer datadrivet revolutionerar användningen av AI och maskininlärning sättet företag fungerar och utvecklas på. Denna studie utforskar användningen av AI, Big Data och Natural Language Processing (NLP) för att förbättra affärsverksamhet och intelligens i företag. READ MORE

  2. 2. Cloud Computing Pricing and Deployment Efforts : Navigating Cloud Computing Pricing and Deployment Efforts: Exploring the Public-Private Landscape

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Casper Kristiansson; Fredrik Lundström; [2023]
    Keywords : Cloud computing; Private cloud; Public cloud; Cloud computing services; Cost-effectiveness; Implementation effort; Google GCP; Microsoft Azure; Amazon AWS; Pricing models; Cloud adoption; Cloud cost management; Cloud migration; Instance computing; Serverless computing; Data storage; Molntjänster; Privat moln; Offentligt moln; Kostnadsjämförelse; Kostnadseffektivitet; Google GCP; Microsoft Azure; Amazon AWS; Molninförande; Molnkostnadshantering; Molnmigration; Instance computing; Serverless computing; Dataförvaring;

    Abstract : The expanding adoption of cloud computing services by businesses has transformed IT infrastructure and data management in the computing space. Cloud computing offers advantages such as availability, scalability, and cost-effectiveness, making it a favored choice for businesses of all sizes. READ MORE

  3. 3. Performance of message brokers in event-driven architecture: Amazon SNS/SQS vs Apache Kafka

    University essay from KTH/Hälsoinformatik och logistik

    Author : Johan Edeland; Ivan Zivkovic; [2023]
    Keywords : event-based architecture; message broker; latency testing; load testing; data streaming; cloud; backend; Apache Kafka; Amazon Simple Queue Service; Amazon Simple Notification Service; händelsedriven arkitektur; meddelandebuss; latenstestning; lasttestning; data strömning; moln; backend; Apache Kafka; Amazon Simple Queue Service; Amazon Simple Notification Service;

    Abstract : Microservice architecture, which involves breaking down applications into smaller and loosely coupled components, is becoming increasingly common in the development of modern systems. Connections between these components can be established in various ways. READ MORE

  4. 4. High-Performing Cloud Native SW Using Key-Value Storage or Database for Externalized States

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Ahmed Sikh; Joel Axén; [2023]
    Keywords : cloud-native; externalized states; latency; simulator; Redis; PostgreSQL; moln-nativ; externaliserade tillstånd; latens; simulator; Redis; PostgreSQL;

    Abstract : To meet the demands of 5G and what comes after, telecommunications companies will need to replace their old embedded systems with new technology. One such solution could be to develop cloud-native applications that offer many benefits but are less reliable than embedded systems. READ MORE

  5. 5. Securing Sensitive Data in the Cloud: A New Era of Security Through Zero Trust Principles

    University essay from KTH/Hälsoinformatik och logistik

    Author : Thomas Yacob; [2023]
    Keywords : Zero Trust; GitLab; Docker; Keycloak; GPG keys; sensitive data; firewalls;

    Abstract : The goal of this report is to examine how traditional security systems are structured and see their shortcomings, and from there propose how a new system can be built to secure sensitive data. The proposed approach is a new architecture called Zero Trust, which means implementing security at the design of the system and providing minimal access to users to perform their tasks. READ MORE