Azure Container Orchestration, Rachael McLoughlin | poster | video |
KNative v. Azure Functions, Ainul Habib | poster | video |
Effectiveness of Generative AI on the Development of Graphic Software Artifacts, Ellen Mezera | poster | video |
Case Studies of RestAPI and GraphQL Architecture, Janni Balraj | poster | video |
Infrastructure as code testing, Terraform Vs Terratest, Ruchira Anil More | poster | video |
An Analysis of Computational Efficiency in Azure App Service, Robert Beatie | poster | video |
Software Repository Assessment in DevOps: A Machine Learning Approach to Quality, Edmund Fitzgerald | poster | video |
Technical Debt Tool Comparisons, Basil Roy | poster | video |
Evaluating the Next Generation Sidecar-less Kubernetes Service Mesh: Ambient Mesh, Anupam Saha | poster | video |
Combining Web Application Security Testing Tools, Darragh Madden | poster | video |
A Performance and Cost Analysis of Java based Function-as-a-Service on AWS, Alan Kavanagh | poster | video |
Comparing Tsetlin Machines to DNNs in model performance and efficiency, Stefan Przemyslaw Gliniecki | poster | video |
Istio Service Mesh vs. Capsule Operator for Kubernetes Multi-tenancy, Sooraj Shajahan | poster | video |
An analysis of Terraform as an enabler of a multi-cloud strategy, Ruaidhri Moran | poster | video |
ML pipeline performance comparison, Ben Stuart | poster | video |
Comprehensive Study of Container Orchestration Frameworks, Ashwini Ravikumar | poster | video |
A Comprehensive Evaluation of Helm and Helmfile for Efficient Management of Microservices, Trinath Chakka | poster | video |
Evaluation of Google GCP Object Storage and and Microsoft Azure Blob Storage, Melbin Paul | poster | video |
Amazon Textract vs Google Document AI vs Azure Document Intelligence, Ian Bruwer | poster | video |
Comparative Analysis of Google Cloud Deployment Manager and Terraform, Brian Ryan | poster | video |
Analysis of Image Security Vulnerabilities over Time, Darragh Clerkin | poster | video |
Navigating Quantum Realities: A Comprehensive Analysis of Quantum Computers, Providers, and Qiskit Compatibility Challenges and Opportunities, Weverton Castanho | poster | video |
Effectiveness of Microservice and Token based Security access control method, Emanual Alby | poster | video |