Essays about: "Computer configuration"
Showing result 1 - 5 of 118 essays containing the words Computer configuration.
-
1. To Deploy, or Not to Deploy, That is the Question A qualitative study of the decision-making experiences of engineers deploying software changes in production
University essay from Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : The web services that millions of people count on require large-scale computer resources (servers, nodes, networking) and an intricate set of interdependent software services. Under pressure to continually improve these services, code and configuration changes are deployed hundreds or thousands of times every day. READ MORE
-
2. Blockchain-based e-voting system without digital ID: A Proof-of-Concept
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : Electronic voting systems have the potential to offer a cost effective, secure and transparent way of communicating with the citizens, increasing trust and participation. However creating a secure open source electronic voting system providing confidentiality and transparency with sufficient performance has long been a challenge. READ MORE
-
3. Design & build a web interface for a quantum computer
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : The Wallenberg Centre for Quantum Technology (WACQT) is a research project that aims to develop a high-end 100-qubit quantum computer. To get an overview of the quantum computer and to gain insights about the quantum computer configuration’s state through visualizations, a Graphical User Interface (GUI) is needed to display the data from the different configurations. READ MORE
-
4. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE
-
5. Approaches and Techniques to Assess the Accuracy of Network Emulators
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As the mobile communication world expands in size and complexity, the need for testing the solutions in a controlled environment before deployment is as pronounced as ever. Simultaneously, new tools and products are developed to optimize the process and reduce costs. READ MORE