• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 98
  • 5
  • 5
  • 5
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 132
  • 28
  • 23
  • 22
  • 21
  • 21
  • 21
  • 20
  • 19
  • 12
  • 11
  • 11
  • 11
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Service quality : a strategic issue for an international terminal operator in southeast Asia to maintain its leading position as the best container terminal operator in Hong Kong /

Chan, Kwok-shun, Henry. January 1996 (has links)
Thesis (M.B.A.)--University of Hong Kong, 1996. / Includes bibliographical references (leaf [84-85]).
72

Kombinovaná přeprava v podmínkách společnosti PELMI s.r.o. / Combined Transport in conditions of PELMI, Ltd.

Kuncová, Andrea January 2013 (has links)
The thesis is divided into two parts. The first theoretical part defines the basic concepts related to combined transport and its current trends and supporting projects. It is focused on the structure of the European transport networks, with emphasis on road and rail transport. The practical part was developed in collaboration with the company PELMI, Ltd. and is focused on the analysis of the current situation of combined transport and price comparison of straight road and combined transport of containers. There is evaluation and definition of the conditions in which is advantageous / disadvantageous to move the containers road carriage to continental combined transport involving rail in conclusion.
73

Single-Use Servers: A Generalized Design for Eliminating the Confused Deputy Problem in Networked Services

Lanson, Julian P. 11 May 2020 (has links)
Internet application servers are currently designed to maximize resource efficiency by servicing many thousands of users that may fall within disparate privilege classes. Pooling users into a shared execution context in this way enables adversaries not only to laterally propagate attacks against other clients, but also to use the application server as a "confused deputy" to gain escalated privileges against sensitive backend data. In this work, we present the Single-use Server (SuS) model, which detects and defeats these attacks by separating users into isolated, containerized application servers with tailored backend permissions. In this model, exploited servers no longer have unfettered access to the backend data or other users. We create a prototype implementation of the SuS model for the WordPress content management system and demonstrate our model's ability to neutralize real-world exploits against vulnerable WordPress versions. We find that the SuS model achieves a high level of security while minimizing the amount of code modification required for porting an application server. In our performance evaluation, we find that the CPU and latency overheads of the SuS model are very low, and memory consumption scales linearly. We generalize the SuS model to be applicable to a wide range of application server and backend resource pairs. With our modularized codebase, we port IMAP, a widely-used mail retrieval protocol, to the SuS model and find that doing so requires minimal effort.
74

Zabezpečená archivace dat s využitím cloudového výpočtu / Secure data archiving using cloud computing

Šulič, Martin January 2021 (has links)
This master’s thesis is focused on detailed analysis of possibilities of implementing a private cloud and secure data archiving for a long period of time using open-source tools. It describes the individual standards and processes of data preparation, as well as the OAIS reference model for long-term preservation. From the analyzed information, a complete design of the final solution is created, with a description of the functionality and the method of deployment in the environment of Docker containers. The design implementation and the main functionality of individual systems such as Archivematica or Nextcloud are thoroughly described and also the hardware requirements and cryptographic security were evaluated.
75

Differences in performance between containerization & virtualization : With a focus on HTTP requests

Berggren, Johannes, Karlsson, Jens January 2022 (has links)
Containerization and virtualization are two of the keystones of cloud computing. Neither technologies are a new invention but did not become widely used until it regained popularity through new implementations. Virtualization regained popularity with the founding of VMWare, and containerization has become vastly popular in the last decade with Docker. When using a service from a Cloud Service Provider today, that service will more than likely be utilizing one of these technologies. This study aims to compare the performance of these two technologies when being used to host an API and how they utilize their provided hardware resources to handle HTTP requests.A series of load tests were conducted on an API developed and hosted on the two technologies to measure the hardware performance, response time and throughput of each technology.Hyper-V was used for virtualization, and Docker was used for containerization. Data was collected on resource utilization, response time, and throughput. The data was also compared to related research to validate it.The results of the experiment showed that, in our implementation, virtualization was superior to containerization in every measured aspect.We conclude that containerization has a bottleneck in the implementation we chose that impedes the container's network performance, which results in the container not being able to process as many HTTP requests as the virtualized environment.The number of processed HTTP requests for the container in relation to CPU usage is superior to that of the virtualized environment, which leads us to believe that it could be possible that the container would be superior if not for the network performance.
76

Static Vulnerability Analysis of Docker Images

Henriksson, Oscar, Falk, Michael January 2017 (has links)
Docker is a popular tool for virtualization that allows for fast and easy deployment of applications and has been growing increasingly popular among companies. Docker also include a large library of images from the repository Docker Hub which mainly is user created and uncontrolled. This leads to low frequency of updates which results in vulnerabilities in the images. In this thesis we are developing a tool for determining what vulnerabilities that exists inside Docker images with a Linux distribution. This is done by using our own tool for downloading and retrieving the necessary data from the images and then utilizing Outpost24's scanner for finding vulnerabilities in Linux packages. With the help of this tool we also publish statistics of vulnerabilities from the top downloaded images of Docker Hub. The result is a tool that can successfully scan a Docker image for vulnerabilities in certain Linux distributions. From a survey over the top 1000 Docker images it has also been shown that the amount of vulnerabilities have increased in comparison to earlier surveys of Docker images.
77

Kubernetes for Game Development : Evaluation of the Container-Orchestration Software

Lundgren, Jonas January 2021 (has links)
Kubernetes is a software for managing clusters of containerized applications and has recently risen in popularity in the tech industry. However, this popularity seems to not have spread to the game development industry, prompting the author to investigate if the reason is a technical limitation. The investigation is done by creating a proof-of-concept of a simple system setup for running a game server in Kubernetes, consisting of the Kubernetes-cluster itself, the game server to be run in the cluster, and a matchmaker server for managing client requests and creation of game server instances. Thanks to the successful proof-of-concept, a conclusion can be made that there is no inherent technical limitation causing its infrequent use in game development, but most likely habitual reasons in combination with how new Kubernetes is.
78

Optimized Autoscaling of Cloud Native Applications

Åsberg, Niklas January 2021 (has links)
Software containers are changing the way distributed applications are executedand managed on cloud computing resources. Autoscaling allows containerizedapplications and services to run resiliently with high availability without the demandof user intervention. However, specifying an auto­scaling policy that can guaranteethat no performance violations will take place is an extremely hard task, and doomedto fail unless considerable care is taken. Existing autoscaling solutions try to solvethis problem but fail to consider application specific parameters when doing so, thuscausing poor resource utilization and/or unsatisfactory quality of service in certaindynamic workload scenarios.This thesis proposes an autoscaling solution that enables cloud native application toautoscale based on application specific parameters. The proposed solution consistsof a profiling strategy that detects key parameters that affect the performance ofautoscaling, and an autoscaling algorithm that automatically enforces autoscalingdecisions based on derived parameters from the profiling strategy.The proposed solution is compared and evaluated against the default auto­scalingfeature in Kubernetes during different realistic user scenarios. Results from thetesting scenarios indicate that the proposed solution, which uses application specificparameters, outperforms the default autoscaling feature of Kubernetes in resourceutilization while keeping SLO violations at a minimum
79

Finding the Sweet Spot: Optimizing Kubernetes for Scalability and Resilience : A Comprehensive Study on Improving Resource Utilization and Performance in Containerized Environments.

Rör, Adam January 2023 (has links)
Modern technology is rapidly and efficiently expanding, and by looking at the largest companies by market cap, one will find enterprises like Apple, Microsoft, Alphabet, and Meta. Given the complexity of modern software architecture, there arises a necessity for a software architecture that is both scalable and adaptable. This demand has given rise to the adoption of microservices as a preferred approach for building complex and distributed applications. However, managing microservices effectively is a difficult task. Therefore, Google created an orchestration tool called Kubernetes (K8). The primary purpose of this thesis is to extend the information about the characteristics of a K8 cluster by monitoring its performance in various scenarios. There is substantial documentation about how K8 works and why it is used. However, insufficient information exists regarding the performance of K8 in different scenarios.  Extensive testing has transpired to extend the information about the characteristics of K8. Parameters such as the number of Pods, containers, mounts, and CPU cores have been thoroughly tested. Additionally, parameters such as container load, CPU limitation, container distribution, and memory allocation have been examined. The core result will include startup time and CPU utilization. The startup time is essential in a K8 cluster because of its ephemeral characteristics, meaning each Pod is short-lived and will restart frequently. CPU utilization testing is essential to analyze how K8 allocate resources and perform with different amounts of resources.  The results show that the most significant parameters regarding startup time are, as one might expect, the number of containers, CPUs, Pods, and the load in each Pod. However, the complexity of the Pod, for instance, the number of mount points, has significantly less effect on the cluster than expected. Regarding CPU utilization, the results show that K8 does lower CPU usage if possible, resulting in equal CPU usage even with different numbers of CPUs. The most significant CPU usage parameter is the load of the application. Finally, this thesis work has filled some gaps in how a K8 cluster behaves during various circumstances, for instance, varying numbers of Pods, containers, or CPUs. One must consider several aspects while designing a K8 cluster. However, all aspects have not been considered, and the usage of K8 increases daily. Therefore, this thesis will hopefully be one of many reports investigating how a K8 cluster behaves and what to consider when building a cluster.
80

Impact of Microbial Inhibitors on the Nutritive Value of and Microbial Growth in Alfalfa Hay Containerized for Exported from the Humid Eastern U.S.

Quick, Kyle Kennedy 18 July 2017 (has links)
The arid conditions found in the west allow for the production of high quality hay for export. However, hay production in this region is highly dependent upon irrigation. There is significant interest in developing a hay export market in the eastern U.S. Therefore, a greater understanding of the challenges and opportunities with containerizing hay in high humidity environments is needed. The objective of this study was to evaluate the impact of hay preservatives on the stability of containerized hay. Treatments included 1) propionic acid at baling, 2) propiopnic acid at baling + surface applied propionic acid at container loading, 3) propionic acid at baling + ammonization of the container after loading, and 4) no preservatives. Propionic acid was applied at a rate of 2.5 kg Mg-1 of hay at baling to all treatments except the control. Hay was then stored for 5 weeks before compressing to a density of 320.0 kg m-3. Immediately before containerizing hay, treatment 2 received a surface application of propionic acid at a rate of 3.4 g bale-1. After loading hay into containers, treatment 3 was ammoniated at a rate of 1.5 kg NH3 Mg-1 DM. Temperature and relative humidity in the containers were monitored for the 45-day storage period. Hay was sampled at compression and immediately after opening the containers. There were no treatment effects on nutritive value parameters after containerization (P > 0.05). Neither propionic acid at harvest, nor treatments at containerization had an effect on mold development in this study (P > 0.05). / Master of Science / Hay exports from the western U.S. have more than doubled since 2000. The arid conditions found in the west allow for the production of high quality hay for export. However, hay production in this region is highly dependent upon irrigation. There is significant interest in developing a hay export market in the humid east. The objective of this study was to evaluate the impact of two hay preservatives on the stability of containerized hay. Treatments included 1) propionic acid at baling, 2) propionic acid at baling + surface applied propionic acid at container loading, 3) propionic acid at baling + ammoniaization of the container after loading, and 4) no preservatives. Propionic acid was applied at a rate of 2.5 kg Mg⁻¹ of hay at baling to Treatments 1, 2, and 3. Hay was then stored for 5 weeks before double compressing. After compression, bales were placed into containers with treatment 2 receiving a surface application of propionic acid at a rate of 3.4 g bale⁻¹ . Treatment 3 was ammoniated in the container after loading at a rate of 1.5 kg NH₃ Mg⁻¹ DM. Temperature and relative humidity in the containers were monitored for the 45 day storage period. Hay was sampled prior to compression, at compression, and immediately after opening the containers. Samples were analyzed for neutral detergent fiber, acid detergent fiber, and crude protein. Subsamples were collected and sent for mold analysis. Results suggest that no treatments are needed in order to export quality alfalfa hay from the Mid-Atlantic.

Page generated in 0.1954 seconds