Results 11 to 20 of about 848,920 (295)
The ‘as code’ activities: development anti-patterns for infrastructure as code [PDF]
This is a journal-first paper accepted at the Empirical Software Engineering Journal on May 29 ...
Akond Rahman +2 more
openaire +2 more sources
Distributing User Code with the CernVM FileSystem [PDF]
The CernVM FileSystem (CVMFS) is widely used in High Throughput Computing to efficiently distributed experiment code. However, the standard CVMFS publishing tools are designed for a small group of people from each experiment to maintain common software ...
Dykstra Dave +4 more
doaj +1 more source
ТЕОРЕТИЧНА ОСНОВА ДЛЯ СТВОРЕННЯ АРХІТЕКТУРИ REAL WORLD DATA LAKE
Data Lakes are the methods for storing and managing large quantities of unstructured data. Modern enterprises and small businesses, regardless of their size, can use this data to derive valuable insights about their business, such as process ...
Markiyan Pyts, Ivanna Dronyuk
doaj +1 more source
Cloud WorkBench - Infrastructure-as-Code Based Cloud Benchmarking [PDF]
To optimally deploy their applications, users of Infrastructure-as-a-Service clouds are required to evaluate the costs and performance of different combinations of cloud configurations to find out which combination provides the best service level for ...
Cito, Jurgen +3 more
core +2 more sources
On the Effectiveness of Tools to Support Infrastructure as Code: Model-Driven Versus Code-Centric
Infrastructure as Code (IaC) is an approach for infrastructure automation that is based on software development practices. The IaC approach supports code-centric tools that use scripts to specify the creation, updating and execution of cloud ...
Julio Sandobalin +2 more
doaj +1 more source
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent. However, due to the characteristics of IoT devices such as low power and low performance, it is difficult to ...
Song-Yi Hwang, Jeong-Nyeo Kim
doaj +1 more source
Introduction/purpose: The paper analyzes the impact of malicious codes in the cloud. Malicious code is an unauthorized piece of code that violates the integrity of an application and infrastructure to cause certain effects, such as security breaches ...
Dragan Z. Damjanović
doaj +1 more source
Raptor codes for infrastructure-to-vehicular broadcast services [PDF]
One of the important applications to be available in vehicular ad-hoc networks are value-added or infotainment services. However, vehicular communication suffers from high packet loss due to challenging channel characteristics such as huge Doppler spread
Abdullah, NF, Doufexi, A, Piechocki, RJ
core +2 more sources
A Compiler and Runtime Infrastructure for Automatic Program Distribution [PDF]
This paper presents the design and the implementation of a compiler and runtime infrastructure for automatic program distribution. We are building a research infrastructure that enables experimentation with various program partitioning and mapping ...
Chu, Matt +3 more
core +1 more source
Source code properties of defective infrastructure as code scripts [PDF]
Context: In continuous deployment, software and services are rapidly deployed to end-users using an automated deployment pipeline. Defects in infrastructure as code (IaC) scripts can hinder the reliability of the automated deployment pipeline. We hypothesize that certain properties of IaC source code such as lines of code and hard-coded strings used as
Akond Rahman, Laurie Williams
openaire +2 more sources

