Virtualization has enabled the commoditization of cloud computing, as the hardware resources have become available to run different environments and share computing resources amongst different enterprises. Two technology types are commonly used in virtualization of hardware, namely, hypervisor and container. The present paper concerns only container technologies.
A comprehensive overview of the container technologies for virtualization and the dynamics of their popularity have not been available yet. Without such an overview, the informed fast choice of technologies is hindered. To fill this knowledge gap, a systemic literature review was conducted to reveal the most popular container technologies and the trends in their research.
The paper focuses on the real-world usage of IEEE 802.11 wireless network encryption and Wi-Fi Protected Setup (WPS) function. A brief history on the development of encryption methods and WPS is given. Wireless scanning of 802.11 networks in a capital city has been performed, and the results of it have been analysed. To ascertain the knowledge about the security of wireless networks of the average user, an online survey has been conducted. To test the security of encryption methods and WPS function, practical attacks against private test wireless networks have been made. The authors conclude that the safest way to set up 802.11 network with a pre-shared key is to use Wi-Fi Protected Access 2 (WPA2) encryption without support for WPS function. Statistics in Riga shows that networks are often configured otherwise and thus vulnerable to attacks. Survey results prove that respondents are not well informed regarding the security of wireless networks.
BPMN (Business Process Model and Notation) models are used to specify business knowledge in the language that is familiar for business people. They consist of multiple process diagrams that highlight different aspects of interaction among participants. Verification of BPMN models is important since graphical fragmentary presentation could be a source of errors such as incompleteness, deadlocks, livelocks, incorrect terminations etc. We consider verification of model completeness. The model is transformed to the topological functioning model (TFM) in order to check completeness of inputs, outputs and functioning cycles of the entire specified system. The proposed approach is dedicated to the verification of the model at the beginning of analysis, and it could be supplemented by other methods at the design stage. This approach is more dedicated to analysis of the whole system, than to the verification of the concrete fragment work.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.