• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 10
  • 9
  • 6
  • 5
  • 5
  • 1
  • Tagged with
  • 51
  • 21
  • 15
  • 14
  • 13
  • 11
  • 11
  • 10
  • 10
  • 9
  • 9
  • 9
  • 8
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Návrh optimalizace IT infrastruktury / IT Infrastructure Optimizing Design

Smejkal, Tomáš January 2011 (has links)
This diploma thesis describes possible solutions of IT infrastucture optimizing using new technologies, such as cloud computing, desktop virtualization and providing software as a service. It gives an analysis of the actual state of IT infrastucture in organization and drafts a suitable economical and system solution. It also describes individual areas of information technologies and their advantages. Finally, it focuses on selecting the most suitable technology with the assessment of its economic benefit for the company.
42

Softwarově definované sítě / Software defined networks

Flimel, Peter January 2016 (has links)
This diploma work describes the software-defined network focusing on optical networks. Subsequently designed their own software network that is implemented in the environment OMNeT ++. This work deals with SDN (software-defined network), and impact on current communications environment in the world of telecom-munications services.
43

Návrh migrace části ICT infrastruktury do datového centra / Design of Part of ICT Infrastructure Migration to the Data Center

Kočíbová, Iveta January 2016 (has links)
This Master Thesis deals with the design of part of ICT infrastructure migration of two sites of the international company to the external data center. It analyzes the current status of company ICT, describes the virtualization infrastructure and its operational costs. Main part of the Thesis describes a possible solution of migration of virtualization infrastructure to external data center by using project management tools and methods. Finally, the Thesis summarizes project benefits for the company.
44

Container Hosts as Virtual Machines : A performance study

Aspernäs, Andreas, Nensén, Mattias January 2016 (has links)
Virtualization is a technique used to abstract the operating system from the hardware. The primary gains of virtualization is increased server consolidation, leading to greater hardware utilization and infrastructure manageability. Another technology that can be used to achieve similar goals is containerization. Containerization is an operating-system level virtualization technique which allows applications to run in partial isolation on the same hardware. Containerized applications share the same Linux kernel but run in packaged containers which includes just enough binaries and libraries for the application to function. In recent years it has become more common to see hardware virtualization beneath the container host operating systems. An upcoming technology to further this development is VMware’s vSphere Integrated Containers which aims to integrate management of Linux Containers with the vSphere (a hardware virtualization platform by VMware) management interface. With these technologies as background we set out to measure the impact of hardware virtualization on Linux Container performance by running a suite of macro-benchmarks on a LAMP-application stack. We perform the macro-benchmarks on three different operating systems (CentOS, CoreOS and Photon OS) in order to see if the choice of container host affects the performance. Our results show a decrease in performance when comparing a hardware virtualized container host to a container hosts running directly on the hardware. However, the impact on containerized application performance can vary depending on the actual application, the choice of operating system and even the type of operation performed. It is therefore important to consider these three items before implementing container hosts as virtual machines.
45

Produktive und sichere Netzanwendungen

Wolf, L., Richter, F., Heik, A., Meyer, R., Ehrig, M., Heide, G., Fischer, G., Kalfa,, Junghaenel, J., Parthey, M., Grunewald, D., Huebner,, Sontag, R., Riedel, W., Harder, F., Becher, M., Mueller, T., Ziegler, C., Anders, J., Breiler, A., Friedrich, R., Koehler, S. 13 July 1999 (has links)
Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur Rechnernetze (Fakultaet Informatik) der TU Chemnitz. Globales Thema: Produktive und sichere Netzanwendungen
46

Zavedení BYOD pro notebooky v Telefónica Czech Republic / Implementation of BYOD for laptops in Telefónica Czech Republic

Pokorný, David January 2013 (has links)
This thesis deals with the implementation of the Bring Your Own Device program for employee's private laptops at Telefonica Czech Republic. It describes the solution using a distributed virtualization. The private laptops are given identical system environments as standard corporate laptops. The solution of the problem is set in the environment of the real corporation. Areas focused on the establishment and operation of the program are security, technology, finance and processes.
47

Soubor laboratorních úloh k demonstraci počítačových útoků / Collection of laboratory works for demonstration of computer attacks

Plašil, Matouš January 2015 (has links)
Diploma thesis describes published attacks on computers and computer networks. Principles of footprinting such as availability check, OS detection, port scanning were described. Next part explains attacks on confidentiality, integrity and availability. In the practical part were created four laboratory tasks and a virtual environment which allowed testing of ARP spoofing, DNS spoofing, SSL strip, Cross-site scripting, SQL injection, flooding attacks (TCP, ICMP, UDP), TCP reset and attack on operating system using backdoor with Metasploit framework. In practical part were also created video samples with attacks and documentation for teachers.
48

Produktive und sichere Netzanwendungen

Wolf, L., Richter, F., Heik, A., Meyer, R., Ehrig, M., Heide, G., Fischer, G., Kalfa, Junghaenel, J., Parthey, M., Grunewald, D., Sontag, R., Riedel, W., Harder, F., Becher, M., Mueller, T., Ziegler, C., Anders, J., Breiler, A., Friedrich, R., Koehler, S. 13 July 1999 (has links)
Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur Rechnernetze (Fakultaet Informatik) der TU Chemnitz. Globales Thema: Produktive und sichere Netzanwendungen
49

Mitteilungen des URZ 2/1999

Fischer, Friedrich, Heik, Hübner, Junghänel, Richter, Riedel, Ziegler 19 July 1999 (has links)
Mobile Informationen - WebDAV AMANDA PHP3 - Professional Home Page Tool 0371 36704 ... stets Anschluß unter dieser Nummer Datenbankservice VMWARE für Linux The Gimp Das Ding Ein fantastischer Stängel auf der Schlossstraße
50

Estudo da efetividade dos mecanismos de compartilhamento de memória em hipervisores / Study of the effectiveness of memory sharing mechanisms in hypervisors

Veiga, Fellipe Medeiros 28 August 2015 (has links)
A crescente demanda por ambientes de virtualização de larga escala, como os usados em datacenters e nuvens computacionais, faz com que seja necessário um gerenciamento eficiente dos recursos computacionais utilizados. Um dos recursos mais exigidos nesses ambientes é a memória RAM, que costuma ser o principal fator limitante em relação ao número de máquinas virtuais que podem executar sobre o mesmo host físico. Recentemente, hipervisores trouxeram mecanismos de compartilhamento transparente de memória RAM entre máquinas virtuais, visando diminuir a demanda total de memória no sistema. Esses mecanismos “fundem” páginas idênticas encontradas nas várias máquinas virtuais em um mesmo quadro de memória física, usando uma abordagem copy-on-write, de forma transparente para os sistemas convidados. O objetivo deste estudo é apresentar uma visão geral desses mecanismos e também avaliar seu desempenho e efetividade. São apresentados resultados de experimentos realizados com dois hipervisores populares (VMware e KVM), usando sistemas operacionais convidados distintos (Linux e Windows) e cargas de trabalho diversas (sintéticas e reais). Os resultados obtidos evidenciam diferenças significativas de desempenho entre os hipervisores em função dos sistemas convidados, das cargas de trabalho e do tempo. / The growing demand for large-scale virtualization environments, such as the ones used in cloud computing, has led to a need for efficient management of computing resources. RAM memory is the one of the most required resources in these environments, and is usually the main factor limiting the number of virtual machines that can run on the physical host. Recently, hypervisors have brought mechanisms for transparent memory sharing between virtual machines in order to reduce the total demand for system memory. These mechanisms “merge” similar pages detected in multiple virtual machines into the same physical memory, using a copy-on-write mechanism in a manner that is transparent to the guest systems. The objective of this study is to present an overview of these mechanisms and also evaluate their performance and effectiveness. The results of two popular hypervisors (VMware and KVM) using different guest operating systems (Linux and Windows) and different workloads (synthetic and real) are presented herein. The results show significant performance differences between hypervisors according to the guest system workloads and execution time.

Page generated in 0.132 seconds