Results 11 to 20 of about 848,920 (295)

The ‘as code’ activities: development anti-patterns for infrastructure as code [PDF]

open access: yesEmpirical Software Engineering, 2020
This is a journal-first paper accepted at the Empirical Software Engineering Journal on May 29 ...
Akond Rahman   +2 more
openaire   +2 more sources

Distributing User Code with the CernVM FileSystem [PDF]

open access: yesEPJ Web of Conferences, 2020
The CernVM FileSystem (CVMFS) is widely used in High Throughput Computing to efficiently distributed experiment code. However, the standard CVMFS publishing tools are designed for a small group of people from each experiment to maintain common software ...
Dykstra Dave   +4 more
doaj   +1 more source

ТЕОРЕТИЧНА ОСНОВА ДЛЯ СТВОРЕННЯ АРХІТЕКТУРИ REAL WORLD DATA LAKE

open access: yesКомпютерні системи та інформаційні технології, 2023
Data Lakes are the methods for storing and managing large quantities of unstructured data. Modern enterprises and small businesses, regardless of their size, can use this data to derive valuable insights about their business, such as process ...
Markiyan Pyts, Ivanna Dronyuk
doaj   +1 more source

Cloud WorkBench - Infrastructure-as-Code Based Cloud Benchmarking [PDF]

open access: yes, 2014
To optimally deploy their applications, users of Infrastructure-as-a-Service clouds are required to evaluate the costs and performance of different combinations of cloud configurations to find out which combination provides the best service level for ...
Cito, Jurgen   +3 more
core   +2 more sources

On the Effectiveness of Tools to Support Infrastructure as Code: Model-Driven Versus Code-Centric

open access: yesIEEE Access, 2020
Infrastructure as Code (IaC) is an approach for infrastructure automation that is based on software development practices. The IaC approach supports code-centric tools that use scripts to specify the creation, updating and execution of cloud ...
Julio Sandobalin   +2 more
doaj   +1 more source

A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools

open access: yesSensors, 2021
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to ...
Song-Yi Hwang, Jeong-Nyeo Kim
doaj   +1 more source

Malicious code in the cloud

open access: yesVojnotehnički Glasnik, 2022
Introduction/purpose: The paper analyzes the impact of malicious codes in the cloud. Malicious code is an unauthorized piece of code that violates the integrity of an application and infrastructure to cause certain effects, such as security breaches ...
Dragan Z. Damjanović
doaj   +1 more source

Raptor codes for infrastructure-to-vehicular broadcast services [PDF]

open access: yes, 2011
One of the important applications to be available in vehicular ad-hoc networks are value-added or infotainment services. However, vehicular communication suffers from high packet loss due to challenging channel characteristics such as huge Doppler spread
Abdullah, NF, Doufexi, A, Piechocki, RJ
core   +2 more sources

A Compiler and Runtime Infrastructure for Automatic Program Distribution [PDF]

open access: yes, 2005
This paper presents the design and the implementation of a compiler and runtime infrastructure for automatic program distribution. We are building a research infrastructure that enables experimentation with various program partitioning and mapping ...
Chu, Matt   +3 more
core   +1 more source

Source code properties of defective infrastructure as code scripts [PDF]

open access: yesInformation and Software Technology, 2019
Context: In continuous deployment, software and services are rapidly deployed to end-users using an automated deployment pipeline. Defects in infrastructure as code (IaC) scripts can hinder the reliability of the automated deployment pipeline. We hypothesize that certain properties of IaC source code such as lines of code and hard-coded strings used as
Akond Rahman, Laurie Williams
openaire   +2 more sources

Home - About - Disclaimer - Privacy