Results 71 to 80 of about 1,217,812 (237)
Security Hardening and Compliance Assessment of Kubernetes Control Plane and Workloads
Containerized applications are pivotal to contemporary cloud-native architectures, yet they present novel security challenges. Kubernetes, a prevalent open-source platform for container orchestration, provides robust automation but lacks inherent ...
Zlatan Morić +2 more
doaj +1 more source
Infrastructure as Code (IaC) underpins automated cloud provisioning in modern DevOps environments; however, controlled comparative evaluations of leading IaC tools under identical conditions remain limited.
Damir Regvart +2 more
doaj +1 more source
Infinity Algebras and the Homology of Graph Complexes
An A-infinity algebra is a generalization of a associative algebra, and an L-infinity algebra is a generalization of a Lie algebra. In this paper, we show that an L-infinity algebra with an invariant inner product determines a cycle in the homology of ...
Penkava, Michael
core +1 more source
Ensuring ongoing endpoint security compliance across diverse, hybrid IT infrastructures poses a continual operational challenge, especially in enterprise Linux systems, where manual verification methods are difficult to scale and prone to inconsistency ...
Zlatan Morić +2 more
doaj +1 more source
Free algebra structure: categorical algebras [PDF]
One of the more important concepts in the study of universal algebras is that of a free algebra. It is our purpose in this communication to describe the structure of the free algebra Kk() of k generators (k a positive integer) determined by a categorical algebra, and to indicate how this information encompasses results in such diverse areas as the ...
openaire +2 more sources
Cyberattacks increasingly generate systemic economic and geopolitical effects in an era of dense global interdependence. While prior research emphasises geopolitical rivalry, institutional capacity, and technological sophistication as determinants of ...
Zlatan Morić +2 more
doaj +1 more source
In 1986 Fumy proposed a simplified approach to calculate inverse discrete Fourier transform (IDFT) using normal bases and its dual in encoding cyclic codes in the spectral domain.
Irwansyah +4 more
doaj +1 more source
Deformations of Batalin-Vilkovisky algebras
We show that a graded commutative algebra A with any square zero odd differential operator is a natural generalization of a Batalin-Vilkovisky algebra. While such an operator of order 2 defines a Gerstenhaber (Lie) algebra structure on A, an operator of ...
Kravchenko, Olga
core +1 more source
On some Gelfand-Mazur like theorems in Banach algebras [PDF]
V.K. Srinivasan
openalex +1 more source
Multi-order fractional nonlinear evolution equations system
In this paper, the existence and uniqueness of a solution to a multi-order fractional nonlinear evolution equations system are studied by applying Banach’s Fixed Point Theorem and some properties of solution operators associated with the system.
Bambang Hendriya Guswanto +2 more
doaj +1 more source

