Spelling suggestions: "subject:"verver"" "subject:"cerver""
581 |
Návrh a implementace řídicího systému pro exponát Kulatý stůl ve VIDA! science centruSavič, David January 2017 (has links)
In the text is described implementation of control system for launching multiplayer games and their administration on the exhibit in VIDA! Science Centre, which consists of 12 touch screens, central computer and central projector.
|
582 |
Workshop webbapplikation : Utveckling av Webbtjänst för pluggstugan vid KTH ICT / Workshop Web Application : Development of Web Application for "pluggstuga" at KTH ICTFirouzi, Abdul Rahman January 2014 (has links)
Kungliga Tekniska Högskolan har för en tid sedan anordnat så kallade ”workshops” för att hjälpa studenter med sina studier. Dessa workshops ger studenterna tillfälle att få hjälp av assistenter. Syftet med detta projekt är därför att göra administrationen för workshopstillfällena så effektiv och smidig som möjligt.För att uppnå detta syfte har en webbapplikation konstruerats i utvecklingsmiljön Netbeans och är baserad på en treskiktsarkitektur. Detta har genomförts med hjälp av utvecklingsmetoden Scrum och programmeringsspråket Java. Stor vikt har lagts på att skapa en modulär applikation med fokus på hållbar utveckling.Resultatet har blivit en webbapplikation som kan nås via mobila enheter, surfplattor och stationära enheter. Den har prestandatestats och är därmed redo för att testas för en utvärdering av dess effektivitet och inverkan på workshopverksamheten. / The Royal Institute of Technology has recently arranged so-called "workshops" to help students with their studies. These workshops give students the opportunity to receive help from assistants. The purpose of this project is to make the administration of the workshop sessions as efficient and seamless as possible.To achieve this purpose, a web application has been designed in Netbeans the development environment and is based on three-layer architecture. This has been implemented using the Scrum development methodology and the Java programming language. Great emphasis was placed on creating a modular application with focus on sustainable development.The result is a web application that can be accessed via mobile devices, tablets, and stationary units. Its performance has been tested and the web application is thus ready to be tested in order to evaluate its effectiveness and impact on the workshop activities.
|
583 |
Fullstack e-handel applikationKushkbaghi, Nick January 2022 (has links)
The goal of this project has been to create an online store for a music store called Music for All. The company's business concept is to sell new and used music equipment online with payment systems via mail or Paypal. The project consists of three separate parts: the first part that stores product information in a SQL Server database created via ASP.NET Core Web API and Entity Framework, the second part consists of an admin interface that contains a login system created by ASP.NET Core Identity Framework which make it possible for a logged in admin be able to create, delete and update products through a Headless CSM which was created by ASP.NET Core MVC and Entity Framework Core. The online store was developed via React.JS, Next.Js and Redux, which created functionality for consuming the REST API and functions that increased the web application's availability and usability. The REST API was developed via ASP.NET Core. The design was performed via React.JS and Sass and Node.JS to be able to execute JS code on the browser. / Målet med detta projektet har varit att skapa en webbutik för en musikaffär som heter Music for All och skulle etablera sig i sommaren. Företagets affärsidé var att sälja nya och begagnade musikutrustningar på nätet med betalningssystem via post eller Paypal. Projektet utvecklades i tre separata delar där en del lagrade produktinformationer i en SQL Server databas som skapades via ASP.NET Core Web API och Entity Framework, andra delen bestod av ett admingränssnitt som innefattade ett inloggningssystem som skapades av ASP.NET Core Identity Framework för att inloggade anställda skulle kunna använda ett innehållshanteringssystem/Headless CSM som skapades via ASP.NET Core MVC och Entity Framework Core. Webbutiken utvecklades via React.JS, Next.Js och Redux som skapade både funktionalitet för konsumering av REST API:et och funktioner som ökade webbapplikationens tillgänglighet och användbarhet. REST API:et utvecklades via ASP.NET Core. Designen utfördes via React.JS, Sass och Node.JS för att kunna exekvera JS kod på webbläsaren.
|
584 |
Optimering av databasinformation / Optimization of Database InformationBlomberg, John, Östlund, Sebastian January 2011 (has links)
Syftet med detta examensarbete är att med avseende på Snow Softwares databas försöka att effektivisera samt omstrukturera de procedurer som hanterar deras regelverk. Den är ej inriktad på att utvärdera eller förändra de algoritmer som redan finns i Microsoft SQL Server. Ett flertal olika prototyper framställdes och utvärderades. Dessa var ej specifika för just denna databas och kan därför vara intressanta även i andra sammanhang. Den prototyp som visade sig vara mest effektiv implementerades så att den enkelt skulle kunna tas i bruk i det nuvarande systemet. Prototypen gav en ungefärlig förbättring i söktid på 18,8 %
|
585 |
Webbserver från ASP.NET 4.8 till Blazor ServerSöderlund, Malin January 2021 (has links)
This report aims to address the design of a web server with Blazor Server for the company FunRock and their mobile strategy game MMA Manager. The web server is intended to administer settings of the game's different components, where staff can, for example, search for a user or a user's belongings. The report is limited to the design of specific pages from the most frequently used ones on the web server. Furthermore, the report wishes to address usability and accessibility analysis of the previous web server due to the basis for the design of the new Blazor Server application. The purpose of converting to Blazor Server has been to contribute to more flexible hosting, faster development and better performance than their previous one, written in ASP.NET 4.8. Finally, the later part of the report addresses a more subjective analysis of the author around the work performed where reflections on the project's results are treated. / Denna rapport önskar behandla utformningen av en webbserver med Blazor Server åt företaget FunRock och deras mobila strategispel MMA Manager. Webbservern ämnar till att administrera inställningar av spelets beståndsdelar, där personal kan exempelvis söka efter en användare eller en användares tillhörigheter. Rapporten erhåller avgränsning till utformning av specifika sidor från den tidigare webbservern som används mest frekvent. Vidare önskar rapporten behandla användbarhets- och tillgänglighetsanalys av den tidigare webbservern med anledning att agera grund till den nya Blazor Server applikationens design. Syftet med utformningen av den nya webbservern har varit att bidra till mer flexibel hostning, snabbare utveckling och bättre prestanda än deras tidigare som var skriven i ASP.NET 4.8. Slutligen tar rapportens senare del upp en mer subjektiv analys av författaren kring det utförda arbetet där reflektioner över projektets resultat behandlas.
|
586 |
TLS Decryption in passive monitoring system with server private keyKäck, Emil January 2021 (has links)
Many network operators need to be able to ensure that customers get the level of service they pay for. To avoid bandwidth and server performance bottlenecks, and easily troubleshoot network problems, the network providers need to be able to see what payload data is sent. Modern networks encrypt data when sending it between nodes that makes passive monitoring more complex. A prevalent encryption mechanism on an IP-based network is TLS that needs to be decrypted. This article’s purpose is to check if it is possible to decrypt TLS traffic in a passive monitoring system with the server’s private key. This is done by implementing a decryptor in a passive monitoring system in the programming language Java. The implemented solution intercepts the traffic, takes out relevant data from the traffic, and derives the session key from that data. How this is done is dependent on what cipher suite is used for the session. Because of delimitations and lack of time the solution is only able to decrypt the cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256. The result showed that it is possible to decrypt TLS traffic and should be possible for more than the specified cipher suite. But there exists a major problem that's called forward secrecy. This is used in the key exchange algorithm called Diffie–Hellman and makes it impossible to decrypt with only server private key. The conclusion is that it is possible but because of forward secrecy, it is not recommended. TLS 1.3 only uses cipher suites with the key exchange algorithm Diffie–Hellman and the forward secrecy functionality is important for security.
|
587 |
Service behaviors and time preferences of rural and urban restaurant customersBaker, Melissa Anne 23 June 2010 (has links)
Do customers in rural and urban markets want the same thing from a restaurant server? While researchers have stressed the importance of sub-culture and made the call for empirical research, few studies have incorporated sub-culture into their research, especially within the hospitality industry. Empirically measuring the differences in sub-culture, may be especially important for restaurant operators as they serve and employ a myriad of different customers in different markets. One under researched yet critical way is through a better understanding of the importance of customer contact employees' behavior. Understanding the importance customers place on standard restaurant wait staff behaviors and time standards may be critical to earning customers satisfaction and patronage, yet few studies have empirically examined this. Developing enhanced ways of understanding how to adapt service delivery behavior to the values of major cultural groups can be extremely beneficial to hospitality managers.
This study attempts to close these gaps by investigating the influence of sub-culture on consumer perceptions of behavioral and timing dimensions in a casual, full-service restaurant setting, through methodological sampling concentrating on two main sub-cultural groups: rural and urban restaurant patrons. Results indicated that sanitation and accommodation were the most important behavioral dimensions for both groups. The level of server responsiveness, friendliness, and knowledge were statistically different for the rural and urban samples. Results suggest that casual restaurant wait staff need to tailor service behavior by accommodating and customizing to the cultural and sub-cultural based guest needs in order to maintain a competitive advantage in satisfying customers. This study also demonstrates theoretical and managerial implications and suggests that further research is needed to investigate differences across other hospitality settings. / Master of Science
|
588 |
Ein Kommunikationssystem zur Unterstützung der mobilen Kommunikation in der SpeditionslogistikGruhn, Volker, Schöpe, Lothar 31 January 2019 (has links)
Der Einsatz von mobiler Kommunikation bei Speditionsunternehmen zur Unterstützung von Logistikprozessen ist nicht erst zur Einführung der elektronischen Maut Gegenstand von F&E Aktivitäten bei Unternehmen und Forschungseinrichtungen. Von Softwareunternehmen werden die unterschiedlichsten Kommunikationssysteme angeboten, die sich hinsichtlich verwendeter Kommunikationstechnik
(Bündelfunk, GSM), ihrer Kommunikationsarchitektur (zentral, dezentral), ihrer Anwendung (SMS, WAP), der Art der genutzten Informationen (Sensorikdaten, Telematikdaten, Transportdaten, Dispositionsdaten) und dem Grad der Integration mit Speditionslogistikanwendungen unterscheiden. Durch den Einsatz von neuen Kommunikationstechniken (GPRS, HSCSD, UMTS) und Telematiktechniken (GPS, LBS) sowie Softwaretechniken (C#, .NET, WebServices) könnten verteilte Client/Serveranwendungen mit umfangreicher verteilter Geschäftslogik zur Unterstützung der Speditionslogistik zum Einsatz kommen. In dem Verbundforschungsprojekt „Mobile Spedition im Web (SpiW) 1“ werden diese neuen Techniken zur Entwicklung eines Kommunikationssystems zur Unterstützung der Speditionslogistik eingesetzt. In diesem Beitrag wird das Verbundforschungsprojekt sowie dessen initiale Motivation und Problemstellung beschrieben. Die Art der Entwicklung des Kommunikationssystems und dessen Architektur wird ebenso dargestellt wie eine exemplarische Anwendung.
|
589 |
Emailový server jako služba pro systémy založené na technologii Windows-NT / Email Server as a Windows Network ServiceJalůvka, Petr January 2007 (has links)
Email is one of the most used services on the Internet. It's hard to find a user with less than one own mailbox. These mailboxes are usually located on servers controlled by someone else than mailbox owners. Users trying to create their own email serverhave to install unix system and go through hard configuration process of the email server. Purpose of this work is to familiriaze reader with email history and protocols and then introduce design and implementation of an email server with easy configuration for Windows NT platform.
|
590 |
Bezpečnostní systém pro eliminaci útoků na webové aplikace / Security System for Web Application Attacks EliminationVašek, Dominik January 2021 (has links)
Nowadays, botnet attacks that aim to overwhelm the network layer by malformed packets and other means are usually mitigated by hardware intrusion detection systems. Application layer botnet attacks, on the other hand, are still a problem. In case of web applications, these attacks contain legitimate traffic that needs to be processed. If enough bots partake in this attack, it can lead to inaccessibility of services provided and other problems, which in turn can lead to financial loss. In this thesis, we propose a detection and mitigation system that can detect botnet attacks in realtime using statistical approach. This system is divided into several modules that together cooperate on the detection and mitigation. These parts can be further expanded. During the testing phase, the system was able to capture approximately 60% of botnet attacks that often focused on spam, login attacks and also DDoS. The number of false positive addresses is below 5%.
|
Page generated in 0.046 seconds