Results 21 to 30 of about 635,439 (298)

When is a container a comonad? [PDF]

open access: yes, 2014
Abbott, Altenkirch, Ghani and others have taught us that many parameterized datatypes (set functors) can be usefully analyzed via container representations in terms of a set of shapes and a set of positions in each shape.
Ahman, Danel   +2 more
core   +2 more sources

Issues of developer interaction with Kubernetes-based cloud infrastructures in test environments

open access: yesИзвестия высших учебных заведений. Поволжский регион:Технические науки, 2023
Background. The object of the study is the issues that arise during the interaction of developers with cloud infrastructures. The subject of the research is methods for ensuring their correct operation with Kubernetes in test environments.
D.S. Fomin   +3 more
doaj   +1 more source

Molded Pulp Products for Sustainable Packaging: Production Rate Challenges and Product Opportunities

open access: yesBioResources, 2022
Molded cellulosic pulp products provide eco-friendly alternatives to various petroleum-based packaging systems. They have a long history of reliable usage for such applications as egg trays and the shipping of fruits.
Mrittika Debnath   +3 more
doaj   +1 more source

Containing risk [PDF]

open access: yesNature, 2009
The ad-hoc proliferation of high-security biological labs must be controlled, and should be tied in more closely to broader research and public-health goals.
openaire   +5 more sources

‘You have to keep your head on your shoulders’: A systems psychodynamic perspective on women leaders

open access: yesSA Journal of Industrial Psychology, 2018
Background:Women leaders within Higher Education Institutions (HEIs) in South Africa have increased in numbers over the past years and they have changed the dynamics in these institutions.
Claude-Helene Mayer   +3 more
doaj   +1 more source

Toward Smart Moving Target Defense for Linux Container Resiliency

open access: yes, 2016
This paper presents ESCAPE, an informed moving target defense mechanism for cloud containers. ESCAPE models the interaction between attackers and their target containers as a "predator searching for a prey" search game. Live migration of Linux-containers
Abed, Amr S.   +3 more
core   +1 more source

Correct Code Containing Containers [PDF]

open access: yes, 2011
For critical software development, containers such as lists, vectors, sets or maps are an attractive alternative to ad-hoc data structures based on pointers. As standards like DO-178C put formal verification and testing on an equal footing, it is important to give users the ability to apply both to the verification of code using containers.
Dross, Claire   +2 more
openaire   +2 more sources

Containerized Architecture Performance Analysis for IoT Framework Based on Enhanced Fire Prevention Case Study: Rwanda

open access: yesSensors, 2022
Nowadays, building infrastructures are pushed to become smarter in response to desires for the environmental comforts of living. Enhanced safety upgrades have begun taking advantage of new, evolving technologies.
Eric Hitimana   +4 more
doaj   +1 more source

Trace-Driven Scaling of Microservice Applications

open access: yesIEEE Access, 2023
The containerized microservices architecture is being increasingly used to build complex applications. To minimize operating costs, service providers typically rely on an auto-scaler to “right size” their infrastructure amid fluctuating ...
Vahid Mirzaebrahim Mostofi   +3 more
doaj   +1 more source

A Quality Improvement Initiative to Standardize Pneumocystis jirovecii Pneumonia Prophylaxis in Pediatric Patients With Solid Tumors

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background Pediatric patients with extracranial solid tumors (ST) receiving chemotherapy are at an increased risk for Pneumocystis jirovecii pneumonia (PJP). However, evidence guiding prophylaxis practices in this population is limited. A PJP‐related fatality at our institution highlighted inconsistent prescribing approaches and concerns about
Kriti Kumar   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy