Results 71 to 80 of about 13,988 (200)

Open‐source AI at scale: Establishing an enterprise AI strategy through modular frameworks

open access: yesAI Magazine, Volume 46, Issue 3, Fall 2025.
Abstract We present a comprehensive enterprise AI strategy developed within the AI Center of Excellence at Fidelity Investments, emphasizing the strategic integration of open‐source AI frameworks into scalable, modular, and reproducible enterprise‐grade solutions.
Serdar Kadıoğlu
wiley   +1 more source

Clinical validation of a real‐time machine learning‐based system for the detection of acute myeloid leukemia by flow cytometry

open access: yesCytometry Part B: Clinical Cytometry, Volume 108, Issue 5, Page 392-403, September 2025.
Abstract Machine‐learning (ML) models in flow cytometry have the potential to reduce error rates, increase reproducibility, and boost the efficiency of clinical labs. While numerous ML models for flow cytometry data have been proposed, few studies have described the clinical deployment of such models.
Lauren M. Zuromski   +10 more
wiley   +1 more source

K8sidecar: A Modular Kubernetes Chain of Sidecar Proxies for Microservices and Serverless Architectures

open access: yesSoftware: Practice and Experience, Volume 55, Issue 8, Page 1305-1319, August 2025.
ABSTRACT Background Modern microservice architectures demand not only modularity, scalability, and maintainability but also adaptation to dynamic requirements. For applications deployed on Kubernetes, sidecar proxies have been used to separate the operational features (such as security, networking, or monitoring) from the application business logic by ...
Andoni Salcedo‐Navarro   +2 more
wiley   +1 more source

Attribute-Based Management of Secure Kubernetes Cloud Bursting

open access: yesIEEE Open Journal of the Communications Society
In modern cloud computing, the need for flexible and scalable orchestration of services, combined with robust security measures, is paramount. In this paper, we propose an innovative approach for managing secure cloud bursting in Kubernetes, combining ...
Mauro Femminella   +3 more
doaj   +1 more source

Implementation of New Security Features in CMSWEB Kubernetes Cluster at CERN [PDF]

open access: yesEPJ Web of Conferences
The CMSWEB cluster is pivotal to the activities of the Compact Muon Solenoid (CMS) experiment, as it hosts critical services required for the operational needs of the CMS experiment. The security of these services and the corresponding data is crucial to
Ali Aamir   +6 more
doaj   +1 more source

DOCKER AND GOOGLE KUBERNETICS.

open access: yesInternational Journal of Advanced Research, 2018
In today?s world, every customer is thinking of agility, parallel development and reducing cost, especially infrastructure cost and operational cost. We have seen SOA world where we have written code and multiple services talk to each other?s for a business use case, but sometimes we end up with one big code base which is monolithic in nature and ...
openaire   +1 more source

Orchestrating Service Migration for Low Power MEC-Enabled IoT Devices

open access: yes, 2019
Multi-Access Edge Computing (MEC) is a key enabling technology for Fifth Generation (5G) mobile networks. MEC facilitates distributed cloud computing capabilities and information technology service environment for applications and services at the edges ...
Ahmad, Ijaz   +4 more
core  

Blockchain-Assisted Trustworthy QoE Accelerator for Adaptive Streaming Over HTTP

open access: yesIEEE Access
This paper presents a blockchain-assisted trustworthy quality of experience (QoE) accelerator for adaptive streaming services over hypertext transfer protocol (HTTP).
Jeongjin Park, Gi Seok Park
doaj   +1 more source

A grid site reimagined: Building a fully cloud-native ATLAS Tier 2 on Kubernetes [PDF]

open access: yesEPJ Web of Conferences
The University of Victoria (UVic) operates an Infrastructure-asa-Service scientific cloud for Canadian researchers, and a Tier 2 site for the ATLAS experiment at CERN as part of the Worldwide LHC Computing Grid (WLCG). At first, these were two distinctly
Taylor Ryan Paul   +2 more
doaj   +1 more source

Análisis sistemático de protocolos de seguridad de datos en el cloud computing: Revisión de la literatura

open access: yesMaskay
Este trabajo presenta una revisión sistemática de estudios relevantes publicados entre los años 2019 y 2024, centrados en los protocolos de seguridad de datos en entornos de computación en la nube.
kevin Zambrano Estupiñan   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy