Azure Container Orchestration, Rachael McLoughlinpostervideo
KNative v. Azure Functions, Ainul Habibpostervideo
Effectiveness of Generative AI on the Development of Graphic Software Artifacts, Ellen Mezerapostervideo
Case Studies of RestAPI and GraphQL Architecture, Janni Balrajpostervideo
Infrastructure as code testing, Terraform Vs Terratest, Ruchira Anil Morepostervideo
An Analysis of Computational Efficiency in Azure App Service, Robert Beatiepostervideo
Software Repository Assessment in DevOps: A Machine Learning Approach to Quality, Edmund Fitzgeraldpostervideo
Technical Debt Tool Comparisons, Basil Roypostervideo
Evaluating the Next Generation Sidecar-less Kubernetes Service Mesh: Ambient Mesh, Anupam Sahapostervideo
Combining Web Application Security Testing Tools, Darragh Maddenpostervideo
A Performance and Cost Analysis of Java based Function-as-a-Service on AWS, Alan Kavanaghpostervideo
Comparing Tsetlin Machines to DNNs in model performance and efficiency, Stefan Przemyslaw Glinieckipostervideo
Istio Service Mesh vs. Capsule Operator for Kubernetes Multi-tenancy, Sooraj Shajahanpostervideo
An analysis of Terraform as an enabler of a multi-cloud strategy, Ruaidhri Moranpostervideo
ML pipeline performance comparison, Ben Stuartpostervideo
Comprehensive Study of Container Orchestration Frameworks, Ashwini Ravikumarpostervideo
A Comprehensive Evaluation of Helm and Helmfile for Efficient Management of Microservices, Trinath Chakkapostervideo
Evaluation of Google GCP Object Storage and and Microsoft Azure Blob Storage, Melbin Paulpostervideo
Amazon Textract vs Google Document AI vs Azure Document Intelligence, Ian Bruwerpostervideo
Comparative Analysis of Google Cloud Deployment Manager and Terraform, Brian Ryanpostervideo
Analysis of Image Security Vulnerabilities over Time, Darragh Clerkinpostervideo
Navigating Quantum Realities: A Comprehensive Analysis of Quantum Computers, Providers, and Qiskit Compatibility Challenges and Opportunities, Weverton Castanhopostervideo
Effectiveness of Microservice and Token based Security access control method, Emanual Albypostervideo