1 |
Využití open source software ve veřejné správě ČR / Usage of Open Source Software in the Czech Public AdministrationČerná, Andrea January 2009 (has links)
This thesis deals with problems of open source software and its usage in an organization. The thesis is divided into three main parts; first of them describes the definiton, history, characteristic and actual offer of open source software; second part moves us to the Public Administration world, where it surveys stage of implementation of open source software in some countries around the world and in the Czech Republic especially; third part uses gained finding from the previous parts to design application architecture to particular conditions of The University of Economics, Prague. First of the main goals of this thesis is to analyse possibilities of implementation of open source software instead of closed software. Next one is to chart the state of implementation of this type of software into Public Administration field in the Czech Republic and abroad. Last objective is to project application architecture with usage of open source software to particular condition of The University of Economics, Prague. These goals was achieved by studying many information resources, discussions with specialist, including of representatives of the state, about the given topics, and further analyse of current conditions of The University of Economics, Prague. Benefits of this thesis are especially compact view on open source software, further the survey of opinions of representatives of state, representatives of towns and next specialists on this type of software a its possibilities of usage in public administration. Last but not least benefit is to desing the application architecture to particular, rather complex, environment of The University of Economics, Prague.
|
2 |
Architektura aplikací pro mobilní zařízení / Architecture of applications for mobile devicesHavel, Vojtěch January 2010 (has links)
This thesis discusses the architecture and the development of applications for mobile device, namely of applications in Java ME platform. The goal of this paper is to draw near the problematic of development for mobile device, analyse pros and cons of several solutions and design the architecture for a few type applications in chosen solution. The theoretical part of this thesis includes the introduction to the mobile development, discussion of benefits and drawbacks of development in Java ME in comparison with other possible solutions, description of main Java ME elements and choosing of type applications for practical part. In the hands-on part of this thesis are chosen the development tools and using previously described elements, the architectures for type applications are made. For each of type application is designed and developed real-life usable application.
|
3 |
Analýza a návrh řešení aplikační architektury finanční instituce / Analysis and Design Application Infrastructure Solutions Financial InstitutionsVychodil, Marek January 2011 (has links)
The topic of the thesis is putting up the application architecture of the organization based othe the actual state, identified requirements, the operational model. The thesis contains description of the business architecture domain, requirements metodology and creation of the operational model of the organization. For the main solution is used the conceptual data model. Application architecture design is presented by the aplication landscape model with the desctiption of the architecture layers and the integration concept including a master data managment concept.
|
4 |
Supporting loose forms of collaboration : Using Linked Data to realize an architecture for collective knowledge constructionEbner, Hannes January 2014 (has links)
This thesis is driven by the motivation to explore a way of working collaboratively that closely reflects the World Wide Web (WWW), more specifically the potential of the Web architecture built on Semantic Web technologies and Linked Data. The goal is to describe a generic approach and architecture that satisfies the needs for loose collaboration and collective knowledge construction as exemplified by the applications described in this thesis. This thesis focuses on a contribution-centric architecture which allows for flexible applications that support loose forms of collaboration. The first research question deals with how Web-based collective knowledge construction can be supported. The second research question explores the characteristics of collective knowledge construction with respect to the Open World Assumption (OWA). The OWA implies that complete knowledge about a subject cannot be assumed at any time, which is one of the most fundamental properties of the WWW. The third research question investigates how Semantic Web technologies be used in order to support such a contribution-centric architecture. The thesis and its underlying publications are of a technical character and are always grounded in theoretical models and considerations that have led to functional implementations. The research has evolved in iterative development processes and was explicitly directed at building applications that can be used in collaborative settings and that are based on standardized Web technologies. One of the main outcomes, an information model, was developed together with such an application and provides a number of novel approaches in the context in which it was designed. The validity of the presented research is supported by evaluations from different perspectives: a list of implemented applications and showcases, results from structured interviews that have investigated the suitability for various resource annotation processes, as well as scalability aspects. The thesis concludes that it is ultimately up to the application how "loose" the collaboration should be and to which extent the OWA is incorporated. The presented architecture provides a toolkit to support the development of loosely collaborative applications. The showcased applications allow the construction of collaborative conceptual models and to collaboratively annotate educational resources. They show the potential of the used technology stack and the introduced contribution-centric architecture that sits on top if it. / <p>QC 20140417</p>
|
5 |
Podnikový intranet firmy Ferona / Business Intranet of FeronaKos, Jiří January 2007 (has links)
Information management has begun to gain importance very fast during the time of internet business, auctions, stock exchanges, in the time of increasing number of international companies. Nowadays very often mentioned topics are how to obtain and deliver right information at the right place in the right moment, how to communicate with business partners, collaborators, superiors. Intranet belongs among devices for information management and I deal with just this theme in my diploma work. The defining of Intranet belongs to main aims of this text i.e. terminology, elements, principals of function, current trends and also giving instructions for building or reconstruction of company intranet. The detailed study of current trends during building company information system, case studies and instructions according to "Best practices" was the way how to achieve defined goals. I gathered information mainly from internet information sources which deal with this topic, mainly from foreign servers. I can see the contribution of my diploma work that it tries to give instructions for managing the project building company intranet, its timing and it draws attention to critical factors of success. The suggestion of new appearance of company intranet is the culmination of my diploma work. The work is clearly structural -- I present the explanation about problems of company information system in the theoretical part, in the practical part I deal with finding out of main lacks and formulation demands of new appearance of company intranet and at the same time I suggest possible new appearance. I evaluate achieving defined objectives and sum up main ideas in the conclusion.
|
6 |
Metodika návrhu architektury SW informačního systému / Methodology for design of information system architecturePlachý, Lukáš January 2008 (has links)
The aim of this work is to propose such a methodology for designing of SW applications architecture that allows effortless, exact and systematical transformation of the real business process into a model suitable as an assignment for implementation by programmers. The aim of this proposal is such a methodology that would allow to reach the above mentioned goals on the basis of easy-to-understand and simple principles and that would be available either as a fundament for its usage within methodologies that are focused on the management of such projects, or as an alternative to methodologies that are much to expensive, complex and/or designed for very large development teams.
|
7 |
Προς το Web 3.0 : διαδικασία ανάπτυξης και αρχιτεκτονική υποστήριξης εφαρμογών παγκόσμιου ιστού που συνδυάζουν τεχνολογίες Web 2.0 και semantic web / Towards Web 3.0 : development process and supporting architecture for web applications combining semantic web and Web 2.0 technologiesΠομόνης, Τζανέτος 21 March 2011 (has links)
Η παρούσα διατριβή έχει ως στόχο να συνεισφέρει στον τομέα του Web Engineering εισάγοντας τρόπους αντιμετώπισης αυτών των προβλημάτων που αντιμετωπίζουν οι Μηχανικοί Παγκόσμιου Ιστού κατά τη διάρκεια του κύκλου ζωής των Εφαρμογών και των Πληροφοριακών Συστημάτων
Παγκόσμιου Ιστού επόμενης γενιάς, και ειδικότερα κατά το σχεδιασμό, την ανάπτυξη και συντήρησή τους.
Ειδικά τα τελευταία χρόνια, η εξέλιξη των εφαρμογών Παγκόσμιου Ιστού στηρίζεται, κατά κύριο λόγο, σε δυο τεχνολογικούς “πυλώνες”: στις βασικές αρχές και τεχνολογίες του Web 2.0 και στο Semantic Web. Είναι ισχυρή η πεποίθηση πως αυτές οι δύο διαφορετικές “σχολές” στην εξέλιξη του Παγκόσμιου Ιστού δε βρίσκονται σε σύγκρουση μεταξύ τους, αλλά μπορούν να συνδυαστούν κατάλληλα ώστε να ξεπεράσουν τις όποιες εγγενείς αδυναμίες τους. Κατ' αυτόν τον τρόπο, οι εφαρμογές Παγκόσμιου Ιστού της επόμενης γενιάς θα είναι σε θέση να συνδυάζουν τις αρχές του Web 2.0, κυρίως αυτές που στοχεύουν στην ευχρηστία των εφαρμογών και στη συνεργατική ανάπτυξη, με το ισχυρό τεχνολογικό υπόβαθρο του Semantic Web που διευκολύνει σε μεγάλο βαθμό την ανταλλαγή και το διαμοιρασμό πληροφορίας μεταξύ των εφαρμογών Παγκόσμιου Ιστού.
Προσφάτως, έχει αρχίσει να χρησιμοποιείται ευρέως ο όρος Web 3.0 για να περιγράψει τη μελλοντική κατεύθυνση που τείνουν να ακολουθήσουν οι εφαρμογές Παγκόσμιου Ιστού. Το Web 3.0 προβλέπεται σαφώς να περιλαμβάνει τις αρχές του Semantic Web και του Web 2.0, αλλά οι ερευνητές πιστεύουν πως θα περιλαμβάνει επίσης και κάποια πιο εξειδικευμένα πεδία όπως η Τεχνητή Νοημοσύνη στον Παγκόσμιο Ιστό (Web AI). Σε κάθε περίπτωση πάντως, δεν έχει καταστεί ξεκάθαρο, όχι μόνο το ποια θα είναι τα πλήρη χαρακτηριστικά του Web 3.0, αλλά και το ποιες θα είναι οι κατάλληλες διαδικασίες και τεχνολογίες, με βάση τις οποίες θα μπορούν να δομηθούν και να αναπτυχθούν οι αντίστοιχες εφαρμογές επόμενης γενιάς, με αποτέλεσμα η πορεία προς το Web 3.0 να γίνεται προς το παρόν με αυθαίρετο και άναρχο τρόπο.
Σε αυτή την κατεύθυνση, μελετάται η παρούσα κατάσταση σχετικά με την υποστήριξη των εφαρμογών του Web 3.0, και γίνονται συγκεκριμένες προτάσεις για τη βελτίωσή της.
Σαν πρώτο βήμα προτείνεται μια αρχιτεκτονική τριών επιπέδων (3-tier), η οποία αφενός, στο χαμηλότερο επίπεδο, περιλαμβάνει μια ισχυρή υποδομή σημασιακής βάσης γνώσης που μπορεί να υποστηρίξει το συνδυασμό πολλαπλών διάσπαρτων πηγών δεδομένων, χωρίς να απαιτεί ένα ισχυρό προϋπάρχον σημασιακό υπόβαθρο, και αφετέρου, στα ψηλότερα επίπεδα, προσφέρει μεγάλη ευελιξία στο χρήστη κατά την αλληλεπίδραση με το υποκείμενο μοντέλο οντολογιών, και μπορεί να υποστηρίξει τη συνεργατική ανάπτυξη των εφαρμογών Παγκόσμιου Ιστού επόμενης γενιάς.
Επίσης, ένα από τα σημαντικότερα τμήματα της παρούσας διατριβής, είναι η πρόταση για μια συγκεκριμένη διαδικασία ανάπτυξης και ένα μοντέλο κύκλου ζωής των εφαρμογών του Web 3.0, όπου, λαμβάνοντας υπόψη τα ιδιαίτερα στοιχεία και τον διττό χαρακτήρα των εν λόγω εφαρμογών, δίνονται εμπεριστατωμένα βήματα για το πως μπορούν να ξεπεραστούν τα όποια εμπόδια και να υπάρξει η μέγιστη δυνατή απόδοση κατά το σχεδιασμό και την ανάπτυξη των εφαρμογών Παγκόσμιου Ιστού επόμενης γενιάς.
Με βάση τα παραπάνω, δίνεται η δυνατότητα για την ανάπτυξη κάποιων ενδεικτικών εφαρμογών Παγκόσμιου Ιστού, οι οποίες συνδυάζουν τη φιλοσοφία του Web 2.0 και το ισχυρό τεχνολογικό υπόβαθρο του Semantic Web. / --
|
8 |
Factors influencing the adoption of enterprise application architecture for supply chain management in small and medium enterprises with Capricorn District MunicipalityLamola, Kingston Xerxes Theophilus January 2021 (has links)
Thesis (M.COM. (Business Management)) -- University of Limpopo, 2021 / Increasing consumer demand, customer expectations, and change in technology compel industrial corporations, governments and small medium enterprises (SMEs) to adopt Enterprise Application Architecture (EAA). EAA is a system where the applications and software are connected to each other in such a way that new components can easily be integrated with existing components. This study focused on how internal and external factors impact the adoption of EAA for Supply Chain Management (SCM) in SMEs, located in the Capricorn District Municipality. Data is analysed through a statistical package for the social sciences (SPSS version 25). A quantitative methodology with self-administered questionnaire was used to collect data from SMEs (SMEs owners and managers). In total, 480 questionnaires were distributed and 310 useable were returned. Cronbach’s Alpha was used to measure reliability. Data validity is obtained through the use of Kolmogorov-Sminorv-Test to ensuring that the questionnaire was based on assumptions from accepted theories as set out in the literature review. From the research findings, it was concluded that the adoption of EAA for SCM in SMEs depends on internal factors, external factors and perceived attitudes towards the adoption of EAA. The managerial implications of the study is based on actual results such as; (a) Internal factors on owners’ characteristics were described as assessment of interior dynamics affecting the enterprise, of which the management have a full control over them, such as employees, business culture, norms and ethics, processes and overall functional activities, (b) The Theory of Reasoned Action (TRA) revealed that behavioural measures on Enterprise Resources that depends on speculations about the intensions towards the adoption of EAA for SCM, (c) Compatibility in Diffusion Theory of Innovation ascertains that Technology Acceptance Models need to be linked with relevant Information System Components to have a functional EAA for SCM, (d) The Theory of Planned Behaviour (TPB) encourages apparent behaviour on control for supplementary forecaster on intentions of employees towards the adoption of EAA for SCM in SMEs, (e) The TPB encourages apparent behaviour on control for supplementary forecaster on intentions of employees towards the adoption of EAA for SCM in SMEs, (f) Consultations with government parastatals or legal representatives of the enterprise would save the SMEs against any unforeseen challenges such as product liabilities, legal costs on lawsuit, tax evasion or avoidance penalties so forth, (g) The Diffusion Theory of Innovation (DTI) proposes that the Perceived Attitudes towards the Adoption of EAA have is affected by behaviour challenges from employees’ personal conduct that affect SCM activities within the SMEs, and (h) The DTI on the intention towards the adoption of EAA for SCM provides the competence in limiting some negative thoughts about the integrative phases or steps limiting the adoption of EAA for SCM.
Keywords: Enterprise Application Architecture; Supply Chain Management; Internal and External Factors Affecting Adoption; and Technology Acceptance Models
|
9 |
Разработка мультиплатформенного программного комплекса предоставления облачных ресурсов : магистерская диссертация / Development of a multiplatform software system for providing cloud resourcesБухалко, А. М., Bukhalko, A. M. January 2023 (has links)
Описаны проблемы работы с ресурсами в крупных IT-компаниях и возможности применения облачных технологий для их решения. Исследованы существующие программные продукты для построения облачных платформ. Разработана и реализована архитектура продукта для работы с разными платформами виртуализации на основе существующего интерфейса взаимодействия OpenStack. / The problems of working with resources in large IT companies and the possibilities of using cloud technologies to solve them are described. The existing software products for building cloud platforms are investigated. The product architecture for working with different virtualization platforms based on the existing OpenStack interaction interface has been developed and implemented.
|
10 |
Threat Hunting basado en técnicas de Inteligencia ArtificialAragonés Lozano, Mario 23 May 2024 (has links)
[ES] Tanto la cantidad como la tipología de los ciberataques va en aumento día a día y la tendencia es que continúen creciendo de forma exponencial en los próximos años. Estos ciberataques afectan a todos los dispositivos, independientemente de si su propietario es un particular (o ciudadano), una empresa privada, un organismo público o una infraestructura crítica y los objetivos de estos ataques son muchos, desde la solicitud de una recompensa económica hasta el robo de información clasificada. Dado este hecho, los individuos, las organizaciones y las corporaciones deben tomar medidas para prevenirlos y, en caso de que en algún momento los reciban, analizarlos y reaccionar en caso de que fuese necesario.
Cabe destacar que aquellos ataques que buscan ser más eficientes, son capaces de ocultarse un largo tiempo, incluso después de sus acciones iniciales, por lo que la detección del ataque y el saneamiento del sistema puede llegar a dificultarse a niveles insospechados o, incluso, no tenerse la certeza de que se ha hecho correctamente.
Para prevenir, analizar y reaccionar ante los ataques más complejos, normalmente conocidos como ataques de día cero, las organizaciones deben tener ciberespecialistas conocidos como cazadores de amenazas. Éstos son los encargados de monitorizar los dispositivos de la empresa con el objetivo de detectar comportamientos extraños, analizarlos y concluir si se está produciendo un ataque o no con la finalidad de tomar decisiones al respecto.
Estos ciberespecialistas deben analizar grandes cantidades de datos (mayormente benignos, repetitivos y con patrones predecibles) en cortos periodos de tiempo para detectar ciberataques, con la sobrecarga cognitiva asociada. El uso de inteligencia artificial, específicamente aprendizaje automático y aprendizaje profundo, puede impactar de forma notable en el análisis en tiempo real de dichos datos. Además, si los ciberespecialistas son capaces de visualizar los datos de forma correcta, éstos pueden ser capaces de obtener una mayor consciencia situacional del problema al que se enfrentan.
Este trabajo busca definir una arquitectura que contemple desde la adquisición de datos hasta la visualización de los mismos, pasando por el procesamiento de éstos y la generación de hipótesis acerca de lo que está sucediendo en la infraestructura monitorizada. Además, en la definición de la misma se deberá tener en consideración aspectos tan importantes como la disponibilidad, integridad y confidencialidad de los datos, así como la alta disponibilidad de los distintos componentes que conformen ésta. Una vez definida la arquitectura, este trabajo busca validarla haciendo uso de un prototipo que la implemente en su totalidad. Durante esta fase de evaluación, es importante que quede demostrada la versatilidad de la arquitectura propuesta para trabajar en diferentes casos de uso, así como su capacidad para adaptarse a los cambios que se producen en las distintas técnicas de aprendizaje automático y aprendizaje profundo. / [CA] Tant la quantitat com la tipologia dels ciberatacs va en augment dia a dia i la tendència és que continuen creixent de manera exponencial en els pròxims anys. Aquestos ciberatacs afecten a tots els dispositius, independentment de si el seu propietari és un particular (o ciutadà), una empresa privada, un organisme públic o una infraestructura crítica i els objectius d'aquestos atacs són molts, des de la sol·licitud d'una recompensa econòmica fins al robatori d'informació classificada. Donat aquest fet, els individus, les organitzacions i les corporacions deuen prendre mesures per a previndre'ls i, en cas que en algun moment els reben, analitzar-los i reaccionar en cas que fora necessari.
Cal destacar que aquells atacs que busquen ser més eficients, són capaços d'ocultar-se un llarg temps, fins i tot després de les seues accions inicials, per la qual cosa la detecció de l'atac i el sanejament del sistema pot arribar a dificultar-se a nivells insospitats o, fins i tot, no tindre's la certesa que s'ha fet correctament.
Per a previndre, analitzar i reaccionar davant els atacs més complexos, normalment coneguts com a atacs de dia zero, les organitzacions han de tindre ciberespecialistes coneguts com caçadors d'amenaces. Aquestos són els encarregats de monitoritzar els dispositius de l'empresa amb l'objectiu de detectar comportaments estranys, analitzar-los i concloure si s'està produint un atac o no amb la finalitat de prendre decisions al respecte.
Aquestos ciberespecialistes han d'analitzar grans quantitats de dades (majoritàriament benignes, repetitives i amb patrons predictibles) en curts períodes de temps per a detectar els ciberatacs, amb la sobrecàrrega cognitiva associada. L'ús d'intel·ligència artificial, específicament aprenentatge automàtic i aprenentatge profund, pot impactar de manera notable en l'anàlisi en temps real d'aquestes dades. A més, si els ciberespecialistes són capaços de visualitzar les dades de manera correcta, aquestos poden ser capaços d'obtindre una major consciència situacional del problema al qual s'enfronten.
Aquest treball busca definir una arquitectura que contemple des de l'adquisició de dades fins a la visualització d'aquestes, passant pel processament de la informació recol·lectada i la generació d'hipòtesis sobre el que està succeint en la infraestructura monitoritzada. A més, en la definició de la mateixa s'haurà de tindre en consideració aspectes tan importants com la disponibilitat, integritat i confidencialitat de les dades, així com la alta disponibilitat dels diferents components que conformen aquesta. Una volta s'hatja definit l'arquitectura, aquest treball busca validar-la fent ús d'un prototip que la implemente íntegrament. Durant aquesta fase d'avaluació, és important que quede demostrada la versatilitat de l'arquitectura proposada per a treballar en diferents casos d'ús, així com la seua capacitat per a adaptar-se als canvis que es produïxen en les diferents tècniques d'aprenentatge automàtic i aprenentatge profund. / [EN] Both the number and type of cyber-attacks are increasing day by day and the trend is that they will continue to grow exponentially in the coming years. These cyber-attacks affect all devices, regardless of whether the owner is an individual (or citizen), a private company, a public entity or a critical infrastructure, and the targets of these attacks are many, ranging from the demand for financial reward to the theft of classified information. Given this fact, individuals, organisations and corporations must take steps to prevent them and, in case they ever receive them, analyse them and react if necessary.
It should be noted that those attacks that seek to be more efficient are able to hide for a long time, even after their initial actions, so that the detection of the attack and the remediation of the system can become difficult to unsuspected levels or even uncertain whether it has been done correctly.
To prevent, analyse and react to the most complex attacks, usually known as zero-day attacks, organisations must have cyber-specialists known as threat hunters. They are responsible for monitoring the company's devices in order to detect strange behaviours, analyse it and conclude whether or not an attack is taking place in order to make decisions about it.
These cyber-specialists must analyse large amounts of data (mostly benign, repetitive and with predictable patterns) in short periods of time to detect cyber-attacks, with the associated cognitive overload. The use of artificial intelligence, specifically machine learning and deep learning, can significantly impact the real-time analysis of such data. Not only that, but if these cyber-specialists are able to visualise the data correctly, they may be able to gain greater situational awareness of the problem they face.
This work seeks to define an architecture that contemplates from data acquisition to data visualisation, including data processing and the generation of hypotheses about what is happening in the monitored infrastructure. In addition, the definition of the architecture must take into consideration important aspects such as the availability, integrity and confidentiality of the data, as well as the high availability of the different components that make it up. Once the architecture has been defined, this work seeks to validate it by using a prototype that fully implements it. During this evaluation phase, it is important to demonstrate the versatility of the proposed architecture to work in different use cases, as well as its capacity to adapt to the changes that occur in the different machine learning and deep learning techniques. / Aragonés Lozano, M. (2024). Threat Hunting basado en técnicas de Inteligencia Artificial [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/204427
|
Page generated in 0.1124 seconds