Essays about: "Mjukvara med Öppen Källkod"

Showing result 1 - 5 of 14 essays containing the words Mjukvara med Öppen Källkod.

  1. 1. Low-power Implementation of Neural Network Extension for RISC-V CPU

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dario Lo Presti Costantino; [2023]
    Keywords : Artificial intelligence; Deep learning; Neural networks; Edge computing; Convolutional neural networks; Low-power electronics; RISC-V; AI accelerators; Parallel processing; Artificiell intelligens; Deep learning; Neurala nätverk; Edge computing; konvolutionella neurala nätverk; Lågeffektelektronik; RISC-V; AI-acceleratorer; Parallell bearbetning;

    Abstract : Deep Learning and Neural Networks have been studied and developed for many years as of today, but there is still a great need of research on this field, because the industry needs are rapidly changing. The new challenge in this field is called edge inference and it is the deployment of Deep Learning on small, simple and cheap devices, such as low-power microcontrollers. READ MORE

  2. 2. Adopting Observability-Driven Development for Cloud-Native Applications : Designing End-to-end Observability Pipeline using Open-source Software

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chujie Ni; [2023]
    Keywords : Observability-driven Development; End-to-end observability; Open-source pipeline; OpenTelemetry; Kubernetes; Observerbarhetsdriven utveckling; observerbarhet från slut till slut; pipeline med öppen källkod; OpenTelemetry; Kubernetes;

    Abstract : As cloud-native applications become more distributed, complex, and unpredictable with the adoption of microservices and other new architectural components, traditional monitoring solutions are inadequate in providing end-to-end visibility and proactively identifying deviations from expected behaviour before they become disruptive to services. In response to these challenges, observability-driven development (ODD) is proposed as a new methodology that leverages tools and practices to observe the state and detect the behaviour of systems. READ MORE

  3. 3. The State of Software Diversity in the Software Supply Chain of Ethereum Clients

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Noak Jönsson; [2022]
    Keywords : Software Supply Chain; Dependency Graphs; Open Source Software; Software Diversity; Ethereum; Blockchain;

    Abstract : The software supply chain constitutes all the resources needed to produce a software product. A large part of this is the use of open-source software packages. READ MORE

  4. 4. Monetizing on-premises software : An explorative study on revenue models of B2B software providers

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälle

    Author : Filip Lundström; [2022]
    Keywords : software; on-premises; on-prem; on-premise; revenue model; revenue models; B2B; business-to-business; business model; business model; business to business; lokalt installerad; lokalt körd; lokal mjukvara; mjukvara; intäktsmodell; intäktsmodeller; affärsmodell; affärsmodeller;

    Abstract : Purpose: The purpose of this study is to increase the understanding of useful revenue models for B2B oriented providers of on-premises software. To fulfill the purpose, two research questions are answered. READ MORE

  5. 5. Clean Code : Investigating Data Integrity and Non-Repudiation in the DevOps Platform GitLab

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : John Augustsson; Johan Carlsson; [2021]
    Keywords : GraphQL; Threat modeling; Open-Source Software; Ethical hacking; DevOps; GraphQL; Hotmodellering; Öppen källkod; Etisk hackning; DevOps;

    Abstract : Recent supply chain attacks on a larger scale in combination with a growing adoption of the set of automated software development and deployment practices commonly referred to as ’DevOps’, made us interested in the security of the underlying infrastructure supporting these practices. If a malicious commit in a piece of software can expose internal systems and networks of all users of said software to vulnerabilities, questions regarding trust and repudiation becomes central, in the platforms themselves as much as in each digitally signed software update version. READ MORE