• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 18
  • 18
  • 9
  • 6
  • 6
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The concrete particulars of the everyday realities of street children

Grundling, J, Grundling, I 11 April 2005 (has links)
The problem of street children in Namibia corresponds with that seen in other Third World countries where the economic and socioeconomic climate favours unemployment and poverty, resulting in cultural degeneration and desperate antisocial behavioural patterns. An example of this phenomenon is the growing numbers of street children who are not an integral part of a family, supportive neighbourhood or healthy surroundings. A recovery plan based on the concrete particulars of the everyday realities of these children is urgently required to reverse the situation. It demands a clear understanding of the problem within the specific context of Namibia. This article describes the general characteristics, behavioural patterns and causes of the phenomenon in order to enable the government to prevent, manage and provide an efficient service to households in Namibia so as to defuse and respond to those factors contributing to children living on the streets.
2

Network Capability Analysis and Related Implementations Improvements Recommendations

Tabassum, Mujahid, Elkhateeb, Khamees January 2009 (has links)
<p>The networking field has become a core component for any company. All of the</p><p>businesses rely on the networking industry, due its vastness and significance. Every day</p><p>companies are planning and thinking to develop better strategies that can offer efficient</p><p>and reliable communication solutions between their employees and customers for</p><p>maximum revenue. The planning of a company’s network requires a lot of resources and</p><p>aspects to study, and to evaluate them carefully to build a comprehensive secure and</p><p>reliable platform. It is the job of a network administrator to take care of the company’s</p><p>network infrastructure and upgrade or update the required components and applications</p><p>from time-to-time that can follow new standards.</p><p>This thesis is a practical work aimed to evaluate a company network infrastructure in its</p><p>real environment. The purpose of this thesis is to evaluate different aspects of the</p><p>network infrastructure used such as VPN, WLAN, firewall and physical security and give</p><p>recommendations to make their performance better and to offer more advanced strategies.</p><p>This study will also provide an inclusive observation of the company’s needs and their</p><p>network infrastructure, and will provide a concept how to evaluate and fix small mistakes,</p><p>the kind of problems that can occur in an evolving company network. Lastly, this research</p><p>will make recommendations and suggest a possible implementation on the studied</p><p>network infrastructure.</p>
3

Network Capability Analysis and Related Implementations Improvements Recommendations

Tabassum, Mujahid, Elkhateeb, Khamees January 2009 (has links)
The networking field has become a core component for any company. All of the businesses rely on the networking industry, due its vastness and significance. Every day companies are planning and thinking to develop better strategies that can offer efficient and reliable communication solutions between their employees and customers for maximum revenue. The planning of a company’s network requires a lot of resources and aspects to study, and to evaluate them carefully to build a comprehensive secure and reliable platform. It is the job of a network administrator to take care of the company’s network infrastructure and upgrade or update the required components and applications from time-to-time that can follow new standards. This thesis is a practical work aimed to evaluate a company network infrastructure in its real environment. The purpose of this thesis is to evaluate different aspects of the network infrastructure used such as VPN, WLAN, firewall and physical security and give recommendations to make their performance better and to offer more advanced strategies. This study will also provide an inclusive observation of the company’s needs and their network infrastructure, and will provide a concept how to evaluate and fix small mistakes, the kind of problems that can occur in an evolving company network. Lastly, this research will make recommendations and suggest a possible implementation on the studied network infrastructure.
4

Fact of Disaster Recover Plan within Information Security Management System ¡ÐExample as CTS Corporation

Lee, Chun-Lung 18 July 2003 (has links)
Abstract The motive of thesis is trying to find out the role of information system security via the researching company ¡V CTS Corporation¡¦s disaster recovery plan and present a model to discuss with that. While through the researching procedure, we found out that most of information security systems obey the BS 7799-2 and ISO 17799 even the CNS 17799 in the world. Through the help of investigation of the questionnaire, all evidence just show out that how to construct and recognize the information security system is the issue and trend for enterprise to do after the ISO 9000 and QS 9000. Since 1978, the case study company, CTS Corporation has had fire and evacuation procedures, which were informally supported by various committees. An emergency plan, which was issued March 24, 1980, incorporated the functions of these committees and provided more formalized procedures for responding to emergencies. The emergency plan was later reissued as know of ¡§CTS Corporation Disaster Recovery Plan¡¨ as one of policy to be followed. In thesis, widely discuss the risk and evaluation of information security and show up some of major case of the information security for domestic and international by sequence of the date. Present some of overview from industry¡Bgovernment and academic how to face such of information security around the enterprises. Final conduct of 10 control sets, 36 control subjects and 127 control items with 8 abstracts of ISO 17799 introduction from BS 7799-1 and BS 779902 with comparison of ISO 17799 totally. Compare and distinguish the variance from CTS Corporation and those of international standard for the information security system, we deploy 4 steps of development the information security system as of: Information Security Policy; Documentation and Implementation; Risks Management and Information Security Management Security (ISMS). Provide evidence of questionnaires of the case study company. Summary three of dimensions for five(5) issues of ¡§Environment & Infrastructure¡¨, seven(7) issues of ¡§Disaster Recovering Planning¡¨ and six(6) issues of ¡§Business Contingency Planning¡¨ to conduce a Disaster Recovery Planning¡¦s Deployment Model for seven steps of four scenario as a conclusion.
5

An investigation into Business Continuity Plan (BCP) failure during a disaster event

Sambo, Mogamat Fadeel January 2012 (has links)
Magister Commercii (Information Management) - MCom(IM) / This thesis examines what a Business Continuity Plan (BCP) should comprise off, as well as the difference between a BCP and a Disaster Recovery Plan (DRP) and the key elements of an effective BCP as well as the different types of disasters. It also investigates why companies that have BCP in place and conducts testing of their plan on a regular basis, either quarterly or bi-annually, still experience prolonged downtime during a disaster resulting in Service Level Agreements (SLA) not being met or major financial loses. It also inspects acceptable processes within a BCP to determine whether there are ways of improving these processes to prevent companies from experiencing prolonged downtime. The objective of this research is to determine and understand: Why organisations within the Western Cape experience prolonged downtimes during a disaster event. The potential deficiencies in a BCP and how they can be amended. A case study of four companies based in the Western Cape was conducted. These companies were chosen because each of them has a BCP in place and each have experienced prolonged downtime during a disaster. Qualitative interviews with the aid of an open-ended questionnaire were used to interview the BCP or Risk Manager of each company. The data was analysed to determine what the causes of their prolonged downtime were during a disaster. In the analysis and findings process each company is presented as a separate case study. The intension with this research study is to add an additional concept to the Common BCP Process that was identified within this study and that formed the basis for the Conceptual Framework, thereby reducing the downtime during a disaster for the companies that formed part of the research.
6

Ozdravení podniku Italiashoes s.r.o. / The recovery of the company Italiashoes, Ltd.

Dudnik, Denis January 2014 (has links)
The aim of this thesis is to analyze the company Italiashoes, Ltd., which is currently in a crisis and to propose recovery measures. In the thesis, various recovery methods were suggested to lead the company out of crisis. The goal of this paper is to examine the reasons causing troubles by using many different methods. Comprehensive view of the various aspects is also going to be discussed in this work.
7

Ecology and conservation of the swift parrot - an endangered austral migrant

Saunders, Debra, debbie.saunders@anu.edu.au January 2008 (has links)
The swift parrot (Lathamus discolor, Psittacidae) is an endangered, austral migrant that inhabits forests and woodlands of south-eastern Australia. With a small population size (2500 birds), broad winter distribution (1 250 000 km2) and often cryptic nature, the swift parrot is a challenging species to study. In autumn they migrate north from their Tasmanian breeding grounds in search of suitable food resources throughout their winter range on mainland Australia. They are therefore dependent on a combination of suitable wintering, migration and breeding habitats. Although they spend a large proportion of their lives within winter habitats, the spatial and temporal dynamics of habitat use in this part of their range is poorly understood. This thesis aims to provide a greater understanding of large-scale winter habitat use by swift parrots, in both historic and current contexts, and provide a basis for future conservation management. ¶ Swift parrots, or red-shouldered paroquets as they were previously known, were among the first Australian birds to be scientifically described and illustrated following European settlement in 1788. However, within 60 years of settlement, habitats throughout the range of the species were being impacted upon. An important aspect of this habitat loss is the speed and spatial extent with which it occurred throughout the parrots’ broad distribution. Although the most extensive habitat loss in some areas occurred during colonial times, habitats continue to be lost as a result of various land management practices. Such impacts are also likely to be exacerbated by the ongoing cumulative impact with rapid climate change. As a result the swift parrot is an endangered species and is the subject of an ongoing national recovery program, to which this thesis contributes. ¶ Conserving habitat for the swift parrot, and other wide-ranging fauna species, is challenging since impacts in one area tend to be dismissed based on the assumption that there is sufficient habitat in other areas. These conservation challenges are discussed in regard to the national swift parrot recovery program. Although recovery program implementation for this species has been successful in identifying and protecting some important habitats, there are still many gaps in our knowledge that need to be addressed through a continuing and adaptive recovery effort, including an understanding of variable habitat use throughout their winter range. ¶ A study of swift parrot winter habitat use was therefore conducted at 53 sites across New South Wales over five years (2001-2005). Swift parrots used a diversity of winter foraging habitats in coastal and/or western slopes regions of New South Wales each year, including several habitats that occur in endangered ecological communities. Landscapes containing winter foraging habitat included scattered trees, remnant vegetation and continuous forests, and swift parrots foraged extensively on lerp and nectar from a diversity of tree species within these. The occurrence of swift parrots at foraging sites was primarily associated with the abundance of lerp, nectar and non-aggressive competitors. Although swift parrot abundance fluctuated significantly between years and regions, over half of all foraging sites were used repeatedly, highlighting their likely importance for conservation. ¶ Patterns of habitat use throughout the species’ winter range were also studied across five states/territories using volunteer data from 4140 surveys. These surveys were conducted by up to 300 volunteers twice a year, for seven years (1998-2004) with swift parrots detected in 19% of surveys. As a result, this study provided the first demonstration of large-scale drought related movements by a migratory population throughout their winter range. It also demonstrated the dynamic spatial and temporal patterns of winter habitat use, including repeated use of sites, by an austral migrant. Four regions in central Victoria were used most consistently, although the birds also visited other regions each year. ¶ During drought swift parrot abundance was significantly correlated with rainfall, whereby most of the population either concentrated in a few regions or migrated longer distances (up to 1000km) to drought refuges in wetter coastal areas. However, swift parrot abundance was not associated with specific climate variables during years of average to high rainfall throughout most of their range. Instead they appeared to prefer habitats within particular regions. Importantly this study emphasises that conservation measures need to be implemented throughout the distribution of migratory species, including drought refuge habitats and areas outside conservation reserves.
8

Recovery measures for the state endangered American marten an internship with two Wisconsin natural resource agencies /

Harvey, Sarah Lynn. January 2004 (has links)
Thesis (M. En.)--Miami University, Institute of Environmental Sciences, 2004. / Title from first page of PDF document. Includes bibliographical references (p. 22-26).
9

Zavedení Business Continuity and Disaster Recovery strategie / Business Continuity and Disaster Recovery Strategy Implementation

Solár, Matúš January 2017 (has links)
This master thesis deals and analyzes the problems in the area of Business Continuity and Disaster Recovery strategy. It proposes a possible solutions, its practical implementation in the real environment of bank. Part of this work speaks about theoretical background, second part of this work analyzes the current situation, which describes the deficiencies in the given directions and in the end are explained my practical advices for implementation of the Business Continuity and Disaster Recovery strategy.
10

Návrh Plánu obnovy pro infrastrukturu podnikatelské fakulty / Draft Recovery Plan for the infrastructure of the Faculty of Business and Management

Srnec, Jan January 2021 (has links)
This diploma thesis deals with the proposal of a “Disaster Recovery Plan” for the Informatics department at BUT’s Faculty of Business and Management. The first part consists of theoretical basis of crucial parts of disaster recovery plan, which is the very foundation for the proposal itself. The second part follows up with a description of the server room of the Informatics department, in particular its IT equipment. The third part deals with the very disaster recovery plan proposal which will function as a school code regulation and a foundation for a Business Continuity Management System document.

Page generated in 0.0504 seconds