Essays about: "workaround"

Showing result 1 - 5 of 17 essays containing the word workaround.

  1. 1. Evaluating Connectivity for RabbitMQ stream clients in front of Load Balancers

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Hanna Littorin; [2024]
    Keywords : ;

    Abstract : Message brokers play a crucial role in decoupling senders and receivers within distributed systems. In some scenarios, it is necessary to distribute a message broker across multiple nodes to form a cluster. To ensure even and fair distribution of client requests across nodes, load balancers are commonly employed in front of the cluster. READ MORE

  2. 2. Feedback Control in Silicon Photonic MEMS

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Andrea Cataldo; Björn Åkermark; [2023]
    Keywords : ;

    Abstract : In this report, we study the implementation of a feedback control system to stabilizea MEMS device for applications in programmable photonic circuits. Specifically, the controller wasimplemented on an all-pass ring resonator, as it was the most suitable MEMS device to implementthe control system on. READ MORE

  3. 3. Room Impulse Response Interpolation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Daníel Thor Wilcox; [2023]
    Keywords : Virtual Acoustics; Machine Learning; Signal Processing; Room Impulse Response; Virtuell Akustik; Maskininlärning; Signalbehandling; rumsimpulssvar;

    Abstract : In Virtual Reality (VR) systems, the incorporation of acoustics allows for the generation of audio-visual stimuli, facilitating applications in engineering, architecture, and design. The goal of virtual acoustics is to create a realistic sound field in continuous space. READ MORE

  4. 4. Understanding the Impact of Cloud-Based Shadow IT on Employee and IT-Manager Perceptions in the Swedish Tech Industry

    University essay from Linköpings universitet/Informationssystem och digitalisering; Linköpings universitet/Filosofiska fakulteten

    Author : Adam Fager; [2023]
    Keywords : Cloud-Based Shadow IT; Shadow IT; Swedish Tech Sector; Data Privacy; Managers; Employees; End User Computation; Workaround; Personal IT; Third-Party Access;

    Abstract : This study focuses on the impact of Cloud-Based Shadow IT on data privacy in the tech sector of Sweden. It explores the use of unapproved applications by employees without the knowledge and control of the IT department. READ MORE

  5. 5. X.509 Certificate-Based Authentication for NETCONF and RESTCONF : Design Evaluation between Native and External Implementation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Qi Li; [2023]
    Keywords : NETCONF; RESTCONF; x509 over SSH; Erlang; Network Automation; PKIX; Public Key Infrastructure X.509 ; NETCONF; RESTCONF; x509 over SSH; Erlang; Nätverksautomatiserng; PKIX; Public Key Infrastructure X.509 ;

    Abstract : The Network Service Ochestrator (NSO) is a network automation system provided by Cisco that is used to automate large network changes with the ability to roll back in case of errors. It provides a rich northbound interface to communicate with the user and a southbound interface to orchestrate network devices securely. READ MORE