• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 30
  • 26
  • 8
  • 5
  • 5
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 122
  • 28
  • 27
  • 23
  • 20
  • 18
  • 12
  • 12
  • 11
  • 10
  • 9
  • 9
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Remote Education : Bringing the classroom home

Ricardo, Verheul January 2020 (has links)
The project started looking at the broader spectrum of remote education during research. After a field trip to Dublin and brainstorm workshops the decision was made to focus on the teachers and students at home as this area showed the need for improvement to the current standard. Bringing the classroom home focuses on the transition of switching from on-campus to fully remote education at home and the hardware solutions that can help improve these situations for both teachers and students. Teacher’s pedagogical education does not prepare them to be online teachers and does not focus on things like the need to create engaging content and live lectures that includes and interact with the students on the other end of the screen. The Classmate Live is an all-in-one solution with optimized camera and audio to serve the live streaming and content creation needs of the online teachers. The device is adjustable in height and together with its extra wide curved display allows for ergonomically improved freedom whether you want to sit down or stand up during your lectures. Running Webex UniversityOS, inspired by streaming platforms such as Twitch, allows the teachers to easily transition between programs and input from external devices like a laptop. The Classmate Live allows for interactive and engaging live sessions without the clutter of various products on the desk. Keeping the workspace clean and easy to use, even if you are not a tech wizard. The students are challenged by the fact they tend to feel alone on the other side of the screen, lectures are not built for remote learning in the first place. Keeping a student’s attention and engagement level up can be quite challenging. The Classmate Connect products allow the user to transform a TV or display into an extended online learning environment in one’s living room. It consists of the Connect Hub and the Connect Camera combined together with Webex University app on one’s smartphone or tablet allows for remote control and transforms every living room into an interactive learning experience. a digital assistant allows for voice control and the Connect camera recognizes in session gestures like raising one’s hand to imitate classroom interactions as much as possible.
12

Dokumentation Netzwerk Chemnitzer Linux-Tag 2004

Kratzert, Sebastian, Möller, Manuel 26 May 2004 (has links)
Während sich der Chemnitzer Linux-Tag über die vergangenen fünf Jahre mit jedem Mal in der Zahl der Aussteller, Helfer und Gäste steigerte, wuchs auch in jedem Jahr das Tagungsnetzwerk. Den Informatikern wird häufig nachgesagt, daß sie wenig dokumentieren würden. Dieses Vorurteil traf auch für das Netzwerk der vergangenen Chemnitzer Linux-Tage zu. Unter anderem, um diesem Mißstand abzuhelfen, haben wir uns bemüht, möglichst detailliert Informationen über Konzept, eingesetzte Technologieen und konkrete Konfiguration des Tagungsnetzwerks des Chemnitzer Linux-Tags 2004 zusammenzutragen.
13

Dokumentation Netzwerk Chemnitzer Linux-Tag 2004

Kratzert, Sebastian. Möller, Manuel. January 2004 (has links)
Chemnitz, Techn. Univ., Studienarb., 2004.
14

Packetfence och Cisco ISE : En jämförelse av NAC

Engfors, Emil, Markstedt, Jens January 2017 (has links)
Syftet med detta arbete var att jämföra de två mjukvarorna Packetfence och Cisco Identity Services Engine. Målet är att bilda en förståelse kring hur den här typen av mjukvaror kan implementeras i ett nätverk av olika storlekar och även en insikt över hur detta kan minska den administrativa belastningen. Den här typen av system kan även användas för att centralt styra åtkomst till ett företags resurser och kan säkra upp olika typ av enheter och program. Det genomfördes en installation för att upptäcka skillnader mellan systemen, därefter konfigurerades de så likt varandra som möjligt för att upptäcka om det finns några olikheter i den här delen av mjukvaran. Rapporten tar upp grundläggande information kring de tjänster som systemen innehåller och beskriver även de steg som krävs för att utföra konfiguration. Rapporten redovisar den metod gruppen arbetat efter under dessa veckor för att uppnå ett tillfredsställande resultat för uppdragsgivaren. Resultatet presenterar arbetet gruppen utfört under arbetet och visar hur de olika systemen kan konfigureras för att uppnå ett säkert nätverk hos ett företag. Diskussionen tar upp att det är viktigt att vara flexibel i sin planering för att arbeta runt uppkomna problem. / The purpose of this study was to compare two security softwares, Packetfence and Cisco Identity Services Engin. The goal was to provide an understanding of how this kind of software can be implemented in a network of different sizes and also an insight into how this can reduce the administrative burden. This type of system can also be used to centrally control access to a company's resources and can secure different types of devices and applications. An installation was completed to detect differences between the systems, then they were configured as similarly as possible to detect if there were any differences in this part of the software. The report summarizes basic information about the services that the systems contain and also describes the steps required to perform configuration. The report presents the methodology the group worked for these weeks to achieve a satisfactory result for the client. The result presents the work the group completed during the study and shows how the various systems can be configured to achieve a secure network for a company. The discussion states that it is important to be flexible in its planning to work around problems that arise.
15

WIRELESS NETWORK MANAGEMENT AND AUTOMATION TOOLS A Comparison study between Cisco Prime and DNAc / TRÅDLÖS NÄTVERKSHANTERING OCH AUTOMATIONSVERKTYG En jämförande studie mellan Cisco Prime och DNAc

Jahan, Saiid January 2024 (has links)
This study investigates two network management tools that are used by Tele2 for managing customers' networks that include access points on the access layer. The problem formulation includes (i) functionalities that these tools can provide, (ii) the amount of functionalities that both tools can provide, (iii) how security can improve productivity for one of these tools, and (iv) how the tools compare in terms of performance. Utilizing a mixed-methods approach, a literature overview on Cisco documents was conducted to find answers about functions and the effects of these functions on tools' productivity. An experiment was conducted to analyze the speed of configuration change performance of both tools. The literature overview helps to make a good analysis of what functionalities these tools can provide and how security can affect the enhancement of productivity in network management tools.
16

Implementation av Network Admission Control

Sandqvist, Mattias, Johansson, Robert January 2007 (has links)
<p>This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don’t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers. There are also functions that handle VLAN assignment for users.</p><p>The assignment where to produce a solution for an implementation of NAC in the company’s computer network. The questions that where asked are the following, if and how could NAC be implemented in the company’s computer network.</p><p>An analysis where made of the company’s computer network, to see if the computer network meet the requirements for implementing NAC. The result of this analysis showed that there where a loss of functions needed for a working NAC solution. The computer network where rebuild from scratch to meet the new demands for NAC. After completion of the new computer network the NAC solution were taking shape. This was made in consultation with the company to get a clear picture of the needs. The result of the discussion lead to a so called “Out-of-band virtual gateway” solution. The solution builds on that the client is placed in an authentication VLAN when connecting to the computer network, after that an authentication process begins. During this process the client is checked to verify that the criteria’s are fulfilled, if so the client is moved to his access VLAN.</p><p>These solutions increase the internal security in the computer network and reduce the risks for virus spreading within the network.</p>
17

Automatiserad kunskapsvalidering

Sköld, Lars January 2008 (has links)
<p>Denna uppsats granskar möjligheter att använda datorstöd för automatisk rättning av</p><p>olika typer av utvärdering. Olika teorier jämförs med varandra för att utvärdera</p><p>deras styrkor och svagheter och för att se vilka begränsningar som finns idag.</p><p>Tanken är att se möjligheterna med dessa system och vad som är möjligt att använda</p><p>och när det är ekonomiskt försvarbart att använda automatisk utvärdering istället för</p><p>manuell rättning.</p>
18

A comparative firewall study in terms of performance, security and configuration

Niklasson, Carl, Lindström, Christian January 2008 (has links)
<p>The goal of this report is to investigate firewalls from both the software and the hardware architecture on their security, functionality, effectives and how the configuration works. The test will consist of scans from Nessus and Nmap which both scans for information and vulnerabilities on the target device. The scans will be performed by first make a basic configuration of the firewall to test its base security. In the second scan will the devices be security configured and rescanned to give an overview on how secure they have become. The target software firewalls used in this test consists of a Debian 4.0, Mikrotik and a Windows 2003 server. The Debian and Windows distributions are both a full OS and have firewall capabilities while Mikrotik is a Linux distribution optimized to work as a firewall. A Cisco 2801 router will also be tested as it is a hardware device optimized for packet handling and have firewall capabilities, and as a router it's likely to already be in a company's network. Finally a Cisco ASA 5510 hardware firewall will be tested to show how a device designed as a firewall will compare to the other devices. The result shows that a Device like the ASA 5510 is clearly superior to any of the other devices in its performance, however the cost efficiency might be in question. The use of a software firewall might be more cost efficient, but might also be more vulnerable as other applications can be run at the OS.</p>
19

A comparative firewall study in terms of performance, security and configuration

Niklasson, Carl, Lindström, Christian January 2008 (has links)
The goal of this report is to investigate firewalls from both the software and the hardware architecture on their security, functionality, effectives and how the configuration works. The test will consist of scans from Nessus and Nmap which both scans for information and vulnerabilities on the target device. The scans will be performed by first make a basic configuration of the firewall to test its base security. In the second scan will the devices be security configured and rescanned to give an overview on how secure they have become. The target software firewalls used in this test consists of a Debian 4.0, Mikrotik and a Windows 2003 server. The Debian and Windows distributions are both a full OS and have firewall capabilities while Mikrotik is a Linux distribution optimized to work as a firewall. A Cisco 2801 router will also be tested as it is a hardware device optimized for packet handling and have firewall capabilities, and as a router it's likely to already be in a company's network. Finally a Cisco ASA 5510 hardware firewall will be tested to show how a device designed as a firewall will compare to the other devices. The result shows that a Device like the ASA 5510 is clearly superior to any of the other devices in its performance, however the cost efficiency might be in question. The use of a software firewall might be more cost efficient, but might also be more vulnerable as other applications can be run at the OS.
20

Analysis and Evaluation of EndpointSecurity Solutions

Bouguetaia, Sabria January 2006 (has links)
The main objective for this degree project was to analyze the Endpoint Security Solutions developed by Cisco, Microsoft and a third minor company solution represented by InfoExpress. The different solutions proposed are Cisco Network Admission Control, Microsoft Network Access Protection and InfoExpress CyberGatekeeper. An explanation of each solution functioning is proposed as well as an analysis of the differences between those solutions. This thesis work also proposes a tutorial for the installation of Cisco Network Admission Control for an easier implementation. The research was done by reading articles on the internet and by experimenting the Cisco Network Admission Control solution. My background knowledge about Cisco routing and ACL was also used. Based on the actual analysis done in this thesis, a conclusion was drawn that all existing solutions are not yet ready for large-scale use in corporate networks. Moreover all solutions are proprietary and incompatible. The future possible standard for Endpoint solution might be driven by Cisco and Microsoft and a rude competition begins between those two giants.

Page generated in 0.0712 seconds