Results 21 to 30 of about 22,005 (237)

Проєктування рівня маршрутизації в мікросервісних архітектурах на платформі Spring

open access: yesСучасний стан наукових досліджень та технологій в промисловості, 2023
The subject matter of research is the routing of requests in the microservice architecture. The goal of the article is to develop a target design concept for the level of request routing in the microservice architecture using the Spring technology stack
Світлана Переяславська   +1 more
doaj   +3 more sources

Using Microservices to Customize Multi-Tenant SaaS: From Intrusive to Non-Intrusive [PDF]

open access: yes, 2020
Customization is a widely adopted practice on enterprise software applications such as Enterprise resource planning (ERP) or Customer relation management (CRM).
Chauvel, Franck   +2 more
core   +1 more source

A Framework of Virtual War Room and Matrix Sketch-Based Streaming Anomaly Detection for Microservice Systems

open access: yesIEEE Access, 2020
Recently, microservice has been a popular architecture to construct cloud-native systems. This novel architecture brings agility and accelerates the software development process significantly.
Hongyang Chen, Pengfei Chen, Guangba Yu
doaj   +1 more source

Anomaly Propagation Based Fault Diagnosis for Microservices [PDF]

open access: yesJisuanji kexue, 2021
Microservice architectures separate a large-scale complex application into multiple independent microservices.These microservices with various technology stacks communicate with lightweight protocols to implement agile development and conti-nuous ...
WANG Tao, ZHANG Shu-dong, LI An, SHAO Ya-ru, ZHANG Wen-bo
doaj   +1 more source

KubeHound: Detecting Microservices’ Security Smells in Kubernetes Deployments

open access: yesFuture Internet, 2023
As microservice-based architectures are increasingly adopted, microservices security has become a crucial aspect to consider for IT businesses. Starting from a set of “security smells” for microservice applications that were recently proposed in the ...
Giorgio Dell’Immagine   +2 more
doaj   +1 more source

Securing Microservices [PDF]

open access: yesIT Professional, 2019
Microservices has drawn significant interest in recent years and is now successfully finding its way into different areas, from Enterprise IT to Internet-of-Things to even Critical Applications. This article discusses how Microservices can be secured at different levels and stages considering a common software development lifecycle.
Nehme, Antonio   +3 more
openaire   +3 more sources

Split and Migrate: Resource-Driven Placement and Discovery of Microservices at the Edge [PDF]

open access: yes, 2020
Microservices architectures combine the use of fine-grained and independently-scalable services with lightweight communication protocols, such as REST calls over HTTP.
Bertier, Marin, Tato, Genc
core   +1 more source

MIA-NDN: Microservice-Centric Interest Aggregation in Named Data Networking

open access: yesSensors, 2023
The named data networking (NDN)-based microservice-centric in-network computation poses various challenges in terms of interest aggregation and pending interest table (PIT) lifetime management. A same-named microservice-centric interest packet may have a
Muhammad Imran   +3 more
doaj   +1 more source

Microservice Transition and its Granularity Problem: A Systematic Mapping Study [PDF]

open access: yes, 2019
Microservices have gained wide recognition and acceptance in software industries as an emerging architectural style for autonomic, scalable, and more reliable computing.
Andrawos M   +87 more
core   +2 more sources

Sim-DRS: a similarity-based dynamic resource scheduling algorithm for microservice-based web systems [PDF]

open access: yesPeerJ Computer Science, 2021
Microservice-based Web Systems (MWS), which provide a fundamental infrastructure for constructing large-scale cloud-based Web applications, are designed as a set of independent, small and modular microservices implementing individual tasks and ...
Yiren Li   +7 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy