• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 30
  • 26
  • 8
  • 5
  • 5
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 122
  • 28
  • 27
  • 23
  • 20
  • 18
  • 12
  • 12
  • 11
  • 10
  • 9
  • 9
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Remote Education : Bringing the classroom home

Ricardo, Verheul January 2020 (has links)
The project started looking at the broader spectrum of remote education during research. After a field trip to Dublin and brainstorm workshops the decision was made to focus on the teachers and students at home as this area showed the need for improvement to the current standard. Bringing the classroom home focuses on the transition of switching from on-campus to fully remote education at home and the hardware solutions that can help improve these situations for both teachers and students. Teacher’s pedagogical education does not prepare them to be online teachers and does not focus on things like the need to create engaging content and live lectures that includes and interact with the students on the other end of the screen. The Classmate Live is an all-in-one solution with optimized camera and audio to serve the live streaming and content creation needs of the online teachers. The device is adjustable in height and together with its extra wide curved display allows for ergonomically improved freedom whether you want to sit down or stand up during your lectures. Running Webex UniversityOS, inspired by streaming platforms such as Twitch, allows the teachers to easily transition between programs and input from external devices like a laptop. The Classmate Live allows for interactive and engaging live sessions without the clutter of various products on the desk. Keeping the workspace clean and easy to use, even if you are not a tech wizard. The students are challenged by the fact they tend to feel alone on the other side of the screen, lectures are not built for remote learning in the first place. Keeping a student’s attention and engagement level up can be quite challenging. The Classmate Connect products allow the user to transform a TV or display into an extended online learning environment in one’s living room. It consists of the Connect Hub and the Connect Camera combined together with Webex University app on one’s smartphone or tablet allows for remote control and transforms every living room into an interactive learning experience. a digital assistant allows for voice control and the Connect camera recognizes in session gestures like raising one’s hand to imitate classroom interactions as much as possible.
12

Dokumentation Netzwerk Chemnitzer Linux-Tag 2004

Kratzert, Sebastian, Möller, Manuel 26 May 2004 (has links)
Während sich der Chemnitzer Linux-Tag über die vergangenen fünf Jahre mit jedem Mal in der Zahl der Aussteller, Helfer und Gäste steigerte, wuchs auch in jedem Jahr das Tagungsnetzwerk. Den Informatikern wird häufig nachgesagt, daß sie wenig dokumentieren würden. Dieses Vorurteil traf auch für das Netzwerk der vergangenen Chemnitzer Linux-Tage zu. Unter anderem, um diesem Mißstand abzuhelfen, haben wir uns bemüht, möglichst detailliert Informationen über Konzept, eingesetzte Technologieen und konkrete Konfiguration des Tagungsnetzwerks des Chemnitzer Linux-Tags 2004 zusammenzutragen.
13

Dokumentation Netzwerk Chemnitzer Linux-Tag 2004

Kratzert, Sebastian. Möller, Manuel. January 2004 (has links)
Chemnitz, Techn. Univ., Studienarb., 2004.
14

Packetfence och Cisco ISE : En jämförelse av NAC

Engfors, Emil, Markstedt, Jens January 2017 (has links)
Syftet med detta arbete var att jämföra de två mjukvarorna Packetfence och Cisco Identity Services Engine. Målet är att bilda en förståelse kring hur den här typen av mjukvaror kan implementeras i ett nätverk av olika storlekar och även en insikt över hur detta kan minska den administrativa belastningen. Den här typen av system kan även användas för att centralt styra åtkomst till ett företags resurser och kan säkra upp olika typ av enheter och program. Det genomfördes en installation för att upptäcka skillnader mellan systemen, därefter konfigurerades de så likt varandra som möjligt för att upptäcka om det finns några olikheter i den här delen av mjukvaran. Rapporten tar upp grundläggande information kring de tjänster som systemen innehåller och beskriver även de steg som krävs för att utföra konfiguration. Rapporten redovisar den metod gruppen arbetat efter under dessa veckor för att uppnå ett tillfredsställande resultat för uppdragsgivaren. Resultatet presenterar arbetet gruppen utfört under arbetet och visar hur de olika systemen kan konfigureras för att uppnå ett säkert nätverk hos ett företag. Diskussionen tar upp att det är viktigt att vara flexibel i sin planering för att arbeta runt uppkomna problem. / The purpose of this study was to compare two security softwares, Packetfence and Cisco Identity Services Engin. The goal was to provide an understanding of how this kind of software can be implemented in a network of different sizes and also an insight into how this can reduce the administrative burden. This type of system can also be used to centrally control access to a company's resources and can secure different types of devices and applications. An installation was completed to detect differences between the systems, then they were configured as similarly as possible to detect if there were any differences in this part of the software. The report summarizes basic information about the services that the systems contain and also describes the steps required to perform configuration. The report presents the methodology the group worked for these weeks to achieve a satisfactory result for the client. The result presents the work the group completed during the study and shows how the various systems can be configured to achieve a secure network for a company. The discussion states that it is important to be flexible in its planning to work around problems that arise.
15

WIRELESS NETWORK MANAGEMENT AND AUTOMATION TOOLS A Comparison study between Cisco Prime and DNAc / TRÅDLÖS NÄTVERKSHANTERING OCH AUTOMATIONSVERKTYG En jämförande studie mellan Cisco Prime och DNAc

Jahan, Saiid January 2024 (has links)
This study investigates two network management tools that are used by Tele2 for managing customers' networks that include access points on the access layer. The problem formulation includes (i) functionalities that these tools can provide, (ii) the amount of functionalities that both tools can provide, (iii) how security can improve productivity for one of these tools, and (iv) how the tools compare in terms of performance. Utilizing a mixed-methods approach, a literature overview on Cisco documents was conducted to find answers about functions and the effects of these functions on tools' productivity. An experiment was conducted to analyze the speed of configuration change performance of both tools. The literature overview helps to make a good analysis of what functionalities these tools can provide and how security can affect the enhancement of productivity in network management tools.
16

Évolution et diversité de deux formes de ciscos (nigripinnis et artedi) dans un drainage proglaciaire du lac Algonquin

Piette-Lauzière, Gabriel 27 March 2024 (has links)
La diversité des ciscos des Grands Lacs Laurentiens (Coregonus artedi, sensu lato) provient de multiples événements de divergence adaptative locale. Cette diversité est aujourd’hui en partie disparue et menacée. Par exemple, la forme nigripinnis est disparue des Grands Lacs mais existe toujours dans le lac Nipigon. La découverte récente de cisco ressemblant à nigripinnis en sympatrie avec artedi dans des lacs reliques d’un exutoire historique du lac proglaciaire Algonquin en Ontario met de l'avant l’hypothèse évolutive selon laquelle ces formes auraient pu coloniser ce territoire en tant que lignées préexistantes. Cette région pourrait donc être dépositaire de la diversité historique des Grands Lacs. Alternativement, nigripinnis pourrait provenir de radiation in situ. L’objectif de ce mémoire est de décrire la diversité phénotypique des nigripinnis et artedi dans cette région, puis de déterminer leur origine évolutive. Pour ce faire, plus de 500 ciscos ont été catégorisés selon deux méthodes de groupements, soit l’habitat de capture (benthique ou pélagique) et le nombre de branchicténies, puis comparés par leur morphologie et leur génétique. Les résultats démontrent un parallélisme de différenciation éco-morphologique entre ces paires de populations et les ciscos artedi et nigripinnis du lac Nipigon. Les branchicténies, le pédoncule caudal et la profondeur du corps étaient les traits les plus différenciés entre les groupes de ciscos. Les analyses génétiques effectuées sur 6676 marqueurs de polymorphisme nucléotidique (SNPs) indiquent que les populations de nigripinnis récemment découvertes dans le Parc provincial Algonquin proviennent d’une colonisation postglaciaire par une lignée atlantique et de divergences in situ répétées. Un continuum de divergence écologique, morphologique et génétique est observé entre les paires de ciscos et pourrait être associé à l’utilisation de ressources alimentaires alternatives. Ce projet confirme la présence de nigripinnis à l’extérieur du lac Nipigon par une approche comparative et intégrative. Ces populations de nigripinnis pourraient être utilisées comme source pour le rétablissement de la diversité fonctionnelle des Grands Lacs. / Laurentian Great Lakes ciscoes (Coregonus artedi, sensu lato) diversity arose via repeated local adaptive divergence. Much of this diversity has vanished or is threatened. For instance, the nigripinnis form is now extirpated from the Great Lakes but remains in L. Nipigon. Ciscoes with some characteristics of nigripinnis have recently been discovered with sympatric artedi in lakes historically covered by the Fossmill outlet, a proglacial drainage of L. Algonquin. This raises the evolutionary hypothesis that artedi and nigripinnis could have colonized the area as distinct pre-existing lineages. Hence, putative nigripinnis may represent a relict embodiment of the historical diversity of ciscoes from the Great Lakes. The objective of this research was to characterize the phenotypic diversity and the evolution of newly observed putative nigripinnis and artedi. To do so, fish were grouped by habitat of capture (benthic and pelagic) and by gill raker counts and contrasted morphologically and genetically. Differentiation within and across lakes was often observed and paralleled that of artedi and nigripinnis in L. Nipigon. Gill rakers, caudal peduncle and body depth were the most important traits differentiating cisco forms. These traits are associated with varying foraging and locomotion strategies. Genetic analyses using 6676 single nucleotide polymorphism (SNPs) markers show that nigripinnis populations found in and nearby Algonquin Provincial Park origin from an Atlantic glacial lineage and repeated in situ divergence. Pairs of sympatric ciscoes were on a continuum of ecological, morphological and genetic differentiation across lakes. The divergence of nigripinnis could be associated to different resource exploitation, such as alternative zooplankton prey. This thesis confirms, by a comparative and integrative approach, the occurrence of a nigripinnis form with an independent evolutionary origin relatively to reference nigripinnis in L. Nipigon. The newly discovered nigripinnis populations could be source for the reestablishment of the functional diversity of the Great Lakes.
17

Implementation av Network Admission Control

Sandqvist, Mattias, Johansson, Robert January 2007 (has links)
<p>This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don’t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers. There are also functions that handle VLAN assignment for users.</p><p>The assignment where to produce a solution for an implementation of NAC in the company’s computer network. The questions that where asked are the following, if and how could NAC be implemented in the company’s computer network.</p><p>An analysis where made of the company’s computer network, to see if the computer network meet the requirements for implementing NAC. The result of this analysis showed that there where a loss of functions needed for a working NAC solution. The computer network where rebuild from scratch to meet the new demands for NAC. After completion of the new computer network the NAC solution were taking shape. This was made in consultation with the company to get a clear picture of the needs. The result of the discussion lead to a so called “Out-of-band virtual gateway” solution. The solution builds on that the client is placed in an authentication VLAN when connecting to the computer network, after that an authentication process begins. During this process the client is checked to verify that the criteria’s are fulfilled, if so the client is moved to his access VLAN.</p><p>These solutions increase the internal security in the computer network and reduce the risks for virus spreading within the network.</p>
18

Automatiserad kunskapsvalidering

Sköld, Lars January 2008 (has links)
<p>Denna uppsats granskar möjligheter att använda datorstöd för automatisk rättning av</p><p>olika typer av utvärdering. Olika teorier jämförs med varandra för att utvärdera</p><p>deras styrkor och svagheter och för att se vilka begränsningar som finns idag.</p><p>Tanken är att se möjligheterna med dessa system och vad som är möjligt att använda</p><p>och när det är ekonomiskt försvarbart att använda automatisk utvärdering istället för</p><p>manuell rättning.</p>
19

A comparative firewall study in terms of performance, security and configuration

Niklasson, Carl, Lindström, Christian January 2008 (has links)
<p>The goal of this report is to investigate firewalls from both the software and the hardware architecture on their security, functionality, effectives and how the configuration works. The test will consist of scans from Nessus and Nmap which both scans for information and vulnerabilities on the target device. The scans will be performed by first make a basic configuration of the firewall to test its base security. In the second scan will the devices be security configured and rescanned to give an overview on how secure they have become. The target software firewalls used in this test consists of a Debian 4.0, Mikrotik and a Windows 2003 server. The Debian and Windows distributions are both a full OS and have firewall capabilities while Mikrotik is a Linux distribution optimized to work as a firewall. A Cisco 2801 router will also be tested as it is a hardware device optimized for packet handling and have firewall capabilities, and as a router it's likely to already be in a company's network. Finally a Cisco ASA 5510 hardware firewall will be tested to show how a device designed as a firewall will compare to the other devices. The result shows that a Device like the ASA 5510 is clearly superior to any of the other devices in its performance, however the cost efficiency might be in question. The use of a software firewall might be more cost efficient, but might also be more vulnerable as other applications can be run at the OS.</p>
20

A comparative firewall study in terms of performance, security and configuration

Niklasson, Carl, Lindström, Christian January 2008 (has links)
The goal of this report is to investigate firewalls from both the software and the hardware architecture on their security, functionality, effectives and how the configuration works. The test will consist of scans from Nessus and Nmap which both scans for information and vulnerabilities on the target device. The scans will be performed by first make a basic configuration of the firewall to test its base security. In the second scan will the devices be security configured and rescanned to give an overview on how secure they have become. The target software firewalls used in this test consists of a Debian 4.0, Mikrotik and a Windows 2003 server. The Debian and Windows distributions are both a full OS and have firewall capabilities while Mikrotik is a Linux distribution optimized to work as a firewall. A Cisco 2801 router will also be tested as it is a hardware device optimized for packet handling and have firewall capabilities, and as a router it's likely to already be in a company's network. Finally a Cisco ASA 5510 hardware firewall will be tested to show how a device designed as a firewall will compare to the other devices. The result shows that a Device like the ASA 5510 is clearly superior to any of the other devices in its performance, however the cost efficiency might be in question. The use of a software firewall might be more cost efficient, but might also be more vulnerable as other applications can be run at the OS.

Page generated in 0.0513 seconds