Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- 4586 (1)
- AAA Tacacs+ LDAP (1)
- Autoencoders (1)
- Behavioral sciences (1)
- Bombardment (1)
-
- Containerization (1)
- Cybersecurity (1)
- Cyberterrorism (1)
- Data Collection (1)
- Data Reduction (1)
- Decision-making process (1)
- Deep Learning (1)
- Devices Listening to You (1)
- Disinformation (1)
- Docker (1)
- Edge Computing (1)
- Enterprise application integration (Computer systems) | Systems integration | Business enterprise -- Data processing | Web services | Electronic commerce | Application software -- Development (1)
- Human Activity Recognition (1)
- Information Systems Security (1)
- IoT (1)
- JMeter (1)
- Kubernetes (1)
- Marketing (1)
- Memcache (1)
- NATO (1)
- Nginx (1)
- Policy Decision Making (1)
- Privacy (1)
- Public Value Forum (1)
- Redis (1)
Articles 1 - 8 of 8
Full-Text Articles in Systems Architecture
Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene
Assessing Performance Optimization Strategies In Cloud-Native Environments Through Containerization And Orchestration Analysis, Daniel E. Ukene
Electronic Theses and Dissertations
This thesis comprises three distinct, yet interconnected studies addressing critical aspects of web infrastructure management. We begin by studying containerization via Docker and its impact on web server performance, focusing on Apache and Nginx hosted on virtualized environments. Through meticulous load testing and analysis, we provide insights into the comparative performance of these servers, adding users of this technology know which webservers to leverage when hosting their webservice along alongside the infrastructure to host it on. Next, we expand our focus to examine the performance of caching systems, namely Redis and Memcached, across traditional VMs and Docker containers. By comparing …
Brave New World Reboot: Technology’S Role In Consumer Manipulation And Implications For Privacy And Transparency, Allie Mertensotto
Brave New World Reboot: Technology’S Role In Consumer Manipulation And Implications For Privacy And Transparency, Allie Mertensotto
Marketing Undergraduate Honors Theses
Most consumers are aware that our data is being obtained and collected through the use of our devices we keep in our homes or even on our person throughout the day. But, it is understated how much data is being collected. Conversations you have with your peers – in a close proximity of a device – are being used to tailor advertising. The advertisements you receive on your devices are uniquely catered to your individual person, due to the fact it consistently uses our data to produce efficient and personal ads. On the flip side, our government is also tapping …
Secure Network Access Via Ldap, Nicholas Valaitis
Secure Network Access Via Ldap, Nicholas Valaitis
Williams Honors College, Honors Research Projects
Networks need the ability to be access by secure accounts and users. The goal of this project is to configure and expand on LDAP configurations with considerations for AAA via TACACS+ and Radius for network equipment. This will provide adequate security for any given network in terms of access and prevent lose of access to devices which happens all to often with locally configured accounts on devices.
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Electronic Thesis and Dissertation Repository
Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney
The Social Media Machines: An Investigation Of The Effect Of Trust Moderated By Disinformation On Users’ Decision-Making Process, Zulma Valedon Westney
CCE Theses and Dissertations
Social media networking sites (SMNS) have become a popular communications medium where users share information, knowledge, and persuasion. In less than two decades, social media's (SM) dominance as a communication medium can't be disputed, for good or evil. Combined with the newly found immediacy and pervasiveness, these SM applications' persuasive power are useful weapons for organizations, angry customers, employees, actors, and activists bent on attacking or hacking other individuals, institutions, or systems. Consequently, SM has become the preferred default mechanism of news sources; however, users are unsure if the information gathered is true or false. According to the literature, SMNS …
Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie
Developing A Cyberterrorism Policy: Incorporating Individual Values, Osama Bassam J. Rabie
Theses and Dissertations
Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.
Senior Project Report - Doctest, Stephen Weessies
Senior Project Report - Doctest, Stephen Weessies
Computer Engineering
DocTest is a program that, simply put, allows a programmer or user to document STANAG 4586 (a standard for unmanned aerial vehicle interoperability) messages and test the vehicle system at Lockheed Martin [5]. The program is extensible to allow for further development aiding our software team to do what they do best and not get bogged down in tedious but necessary documentation. DocTest is also used to aid in testing, keeping track of the issues and bugs found and creating a document that captures each issue so an issue is not missed or forgotten. This program was made for use …
A Toolkit For Xml-Based And Process-Oriented Application Integration, Volker Münch
A Toolkit For Xml-Based And Process-Oriented Application Integration, Volker Münch
Theses
Systems integration is hard work; different architectures with different interfaces and an innumerable amount of Legacy applications with non-standard interfaces exist. However the needs to meet changing business requirements and to implement faster and optimised procedures within an enterprise and in cooperation with other external enterprises mean that there is a continuing demand for such integration strategies and products. Integration was often an activity separate from system development and could not be accomplished without re-involving system designers and developers. Such a process is therefore inefficient and costly. This thesis proposes a process-oriented integration strategy that combines the tasks of integration …