Essays about: "computer software and decision making"

Showing result 1 - 5 of 20 essays containing the words computer software and decision making.

  1. 1. To Deploy, or Not to Deploy, That is the Question A qualitative study of the decision-making experiences of engineers deploying software changes in production

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Jessica Ann DeVita; [2024]
    Keywords : Automation; Common ground; Complexity; Coordination; COVID19 pandemic; Deployment decision; Incident response; Mental model; Naturalistic decision-making; Phenomenology; Resilience; Risk; Software engineering; SRE; Strategy; Temporal reasoning; Uncertainty; Web operations; FLMU06; Technology and Engineering;

    Abstract : The web services that millions of people count on require large-scale computer resources (servers, nodes, networking) and an intricate set of interdependent software services. Under pressure to continually improve these services, code and configuration changes are deployed hundreds or thousands of times every day. READ MORE

  2. 2. Exploring the Phenomenon of Data Science : An Exploratory Study of the Field and its Scientists

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Filip Bäck; [2023]
    Keywords : Data Science; Interdisciplinary; Practical Responsibilities;

    Abstract : The recent abundance of data combined with the current digitalisation all over the globe has made organisations across various industries become more involved with data-driven processes. The power of data is harnessed through wrangling and analysis in order to not only create valuable insights to guide strategic decision-making but to also improve efficiency and productivity. READ MORE

  3. 3. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Author : Gustaf Tysk; [2023]
    Keywords : Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Abstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE

  4. 4. Trainable Region of Interest Prediction: Hard Attention Framework for Hardware-Efficient Event-Based Computer Vision Neural Networks on Neuromorphic Processors

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Cina Arjmand; [2023]
    Keywords : Artifical Intelligence; Machine Learning; Neuromorphic Engineering; Computer Vision; Technology and Engineering;

    Abstract : Neuromorphic processors are a promising new type of hardware for optimizing neural network computation using biologically-inspired principles. They can effectively leverage information sparsity such as in images from event-based cameras, and are well-adapted to processing event-based data in an energy-efficient fashion. READ MORE

  5. 5. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kateryna Sydorenko; [2023]
    Keywords : Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Abstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE