Spelling suggestions: "subject:"verver"" "subject:"cerver""
241 |
Využití technologie GCD pro potřeby antivirového softwaru / Applicability of GCD Technology to Antivirus SoftwareŠvec, Michal January 2011 (has links)
This master's thesis describes Grand Central Dispatch technology. It is technology for parallel computing and task processing. It also describes history and techniques of parallel computing. As an example stand simple HTTP server with 4 methods of request parallel processing. Server is connected to AVG antivirus software and check each request for viruses.
|
242 |
Inteligentní zahrada / Smart gardenDvořák, Jakub January 2016 (has links)
The main objective of this work is created using Raspberry Pi intelligent garden. The first part is devoted to the concept of intelligent building. The second part describes the used hardware components. Another section is devoted SW Raspberry microcomputer and microcontroller Arduino. The last chapter describes the implemented model of a intelligent garden.
|
243 |
Mobile Communication Systems for Truckage CompaniesGruhn, Volker, Hülder, Malte, Ijioui, Raschid 30 January 2019 (has links)
The future of truckage companies lies in providing a more efficient and cost effective transport service, they must respond quickly to their customers’ needs and problems emerging during transport processes. Continuous and up-to-date understanding of business processes is essential and requires a reliable and user-friendly communication system. The project „Mobile Spedition im Web (SpiW)2“ presented here, develops such a mobile communication system, which focuses on the driver/dispatcher interaction. The main goals are integration with legacy logistics software and the possible use of new telematics and communication techniques. A mobile workflow server supports the adjustment of business processes to individual needs and the component based architecture of the communication system
allows the later change and extension of components, making it possible to add new features to the system as they become available.
|
244 |
Realizace datového skladu pro analýzu závad železničních vozidelRichter, Jan January 2019 (has links)
This thesis follows up the creation of data warehouse on Microsoft SQL Server for analysis of measured railway vehicle transits, with provided weather data by Dark Sky service. Thesis represents full data warehouse design (by Kimball Group model) with ETL processes to secure data initialization and automatic updates. Thesis also shows two approaches to presentation layer on data warehouse, by Microsoft Excel (linked to multidimensional cube) and by Power BI.
|
245 |
Kubernetes for Game Development : Evaluation of the Container-Orchestration SoftwareLundgren, Jonas January 2021 (has links)
Kubernetes is a software for managing clusters of containerized applications and has recently risen in popularity in the tech industry. However, this popularity seems to not have spread to the game development industry, prompting the author to investigate if the reason is a technical limitation. The investigation is done by creating a proof-of-concept of a simple system setup for running a game server in Kubernetes, consisting of the Kubernetes-cluster itself, the game server to be run in the cluster, and a matchmaker server for managing client requests and creation of game server instances. Thanks to the successful proof-of-concept, a conclusion can be made that there is no inherent technical limitation causing its infrequent use in game development, but most likely habitual reasons in combination with how new Kubernetes is.
|
246 |
Databáze SkillMatrix / SkillMatrix DatabaseVorel, Roman January 2007 (has links)
This work deals with creation of database information system for employee training and bonus calculation with direct connection on existing personal systems in Honeywell production company. The project makes provision for solution on dynamic database server and maximal usage of its potentiality for application development. The system dispose of access privileges containing several user roles and role of administrator. The system concept is realized in UML modeling language. The implementation is realized on Microsoft technologies. The system is generally implmented in 3 tiers: user interface, database component, data base model. The user interface is implemented in ASP.NET 2.0 with utilization of ASP.NET AJAX 1.0 technology. The database component is implemented using object oriented language Visual .NET C# and ADO.NET classes. Data base is relized on SQL Server 2000 in Transact-SQL language. The integral part of the project is also testing on sample data and application in live business on Honeywells company intranet.
|
247 |
Securing Modern Cyberspace Using A Multi-Faceted ApproachLi, Yu 06 June 2019 (has links)
No description available.
|
248 |
The G-Network and Its Inherent Fault Tolerant PropertiesHaynes, Teresa, Dutton, Ronald D. 01 January 1990 (has links)
This paper presents the G-network, a new topological design which is a suitable architecture for point-to-point communication and interconnection networks, We show that the G-network has the following desirable characteristics: Efficient routing, small number of links, and fault tolerance. The performance of the G-network is compared to that of the Barrel Shifter and Illiac Mesh networks.
|
249 |
PERFORMANCE EVALUATION OF AN ENHANCED POPULARITY-BASED WEB PREFETCHING TECHNIQUESharma, Mayank January 2006 (has links)
No description available.
|
250 |
Carry and Expand: A New Nomadic Interaction ParadigmArthur, Richard B. 28 November 2011 (has links) (PDF)
People are nomadic; traveling from place to place. As a user travels, he may need access to his digital information, including his data, applications, and settings. A convenient way to supply this access is to have the user carry that digital information in a portable computer such as a laptop or smart phone. As Moore's Law continues to operate, devices such as smart phones can easily perform the computing necessary for a user's work. Unfortunately, the amount of data a human can receive and convey through such devices is limited. To receive more information humans require more screen real estate. To transmit more information humans need rich input devices like mice and full-sized keyboards. To allow users to carry their digital information in a small device while maintaining opportunities for rich input, this research takes the approach of allowing users to carry a small portable device and then annex screens, keyboards, and mice whenever those devices are available in a user's environment. This research pursued the "carry it with you" paradigm first by building an ideal annexing framework which helps maximize the screen real estate while minimizing the resources—RAM, CPU, and wireless radio—consumed on the personal device. The resource consumption is demonstrated through a comparison with existing remote rendering technologies. Next, a privacy-aware framework was added to the annexing framework to help protect the user's sensitive data from damage and theft when he annexes a potentially malicious device. A framework like this has not existed before, and this research shows how the user's sensitive data is protected by this framework. Third, legacy machines and software are allowed to participate in the carry-it-with-you experience by scraping pixels from the user's existing applications and transmitting those pixels to an annexed display. Finally, when a user encounters a display space he does not own, but which he needs to control (e.g. by preventing anyone else from annexing it simultaneously, or by constraining each user to a different section of the display space), rather than forcing the user to learn and use control software supplied by the display, the user can bring his own control software and use it to enforce the user's desired control paradigm. This dissertation shows the carry-it-with-you paradigm is a powerful potential avenue which allows users to confidently use display spaces with varying configurations in an assortment of environments.
|
Page generated in 0.0665 seconds