Sök:

Sökresultat:

19047 Uppsatser om Information Technology - Sida 7 av 1270

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Handelsbranschers användning av Augmented reality : En studie om dess möjligheter, utveckling och användning

Augmented reality is an interesting technology which has increased in popularity the last couple of years. Even though we see more and more of this technology the use of it doesn?t match up to its true potential. This paper aims to investigate the possibilities of this technology and illustrate how companies can use it in their business to reach out to customers in a new and exciting way. The study consists of three parts.

Dominerande affärsmodeller inom området informationssäkerhet

Computers together with Internet have been growing enormously, during the last decade and the area of Information Technology has been growing in the same speed. As long as the surrounding environment evolves, the business models must within the IT-area, keep the same pace. So, how do business corporations handle this change to attract customers? How do the dominant business models look like? In many cases, they are apparently much the same. But what differences can we see and what areas can be improved? We have showed that the IT area isn?t just one, it consist of several segments.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Webbhjälpmedel för synskadade

The purpose of this paper is to find out how visually impaired people get information on Internet. Visually impaired people has got the right to be able to use the Internet like everyone else. We are also going to revise which aids visually impaired people use today, and how they work in practise. What problems can you run into when you use these aids? We are also going to revise how the webpages design affect the use of the Internet for the visually impaired people.

Informationskompetens i det svenska och bayerska gymnasiet : En jämförande analys av det svenska och det bayerska gymnasiets läro- och ämnesplaner

This study is a comparative study of the occurrence and function of information literacy in the curricula of the Swedish and Bavarian Gymnasium and investigates the occurrence of the term ?information literacy? and shows through what other linguistic means the notion of information literacy is expressed in the curricula. The study also wishes to analyze how the notion of information literacy manifests itself in the different school systems. Relevant textual passages of both curricula are compared to each other through the theoretic lens of Bruce?s phenomenographic model of information literacy.

Tar vi barnens intresse för natur och teknik på allvar? : En kvalitativ studie om hur några förskollärare resonerar runt möjligheterna att ta tillvara barnens intresse för naturvetenskap och teknik i förskolan

The purpose of this study was to examine and compare what six preschool teachers thought about their opportunities to take advantage of children's interest in natural sciences and technology, across four kindergartens. The following questions were explored in order to achieve the aim of the study: How do the preschool teachers interviewed describe their work with science and technology in the preschool and what these preschool teachers think about the meaning of motivation in the children?s learning of natural sciences and technology in preschool.  The study used a qualitative approach in the form of semi-structured interviews and interviewed a total of six trained pre-school teachers from four kindergartens with different profiles. The first kindergarten focuses on mathematics, science and technology.

Wiki på skolbibliotek ? En fallstudie om användningen av wiki som stöd i informationssökningsundervisningen

The purpose of this Master?s Thesis is to examine and describe how a wiki can be used in the information seeking education. We believe that the preconditions for education and learning are changing; technology and Internet has introduced new tools for the learning situation. To examine this we will describe how the wiki technology can be used in the information seeking education, describe how the goals of the information seeking education are reached when using a wiki and lastly investigate the school librarian?s pedagogical role in wiki-based education.

E-BUSINESS, WHAT IS IT GOOD FOR: AN EXPLANATORY STUDY OF FIVE COMPANIES? E-BUSINESS SOLUTIONS

The notion of firms interacting with technology is not new; these types of systems were already in place in the mid eighties. E-business users worked with connections between their inbound logistics and procurement systems, and suppliers? order-entry systems. When these connections were described for the first time the vertical links between two, or more, value chains in a value system received more attention in firm strategy. The design of the linkages in the value system was said to be a product of the need for coordination and relative bargaining power.

Distribution av känslig data

Information Technology (IT) makes it possible to electronically distribute data between actorswho are in geographically diverse areas. Nowadays, information is sent less frequently throughtraditional correspondence in favor of faster electronic equivalents via the internet.Despite effective IT environmentand secure encryption techniques choose some actors to sendinformation through physical delivery. This phenomenon occurs in those working withconfidential information as it is handled by a number of rules and safety regulations.Based on a set of rules and requirements, we have looked over the possibility of sending sensitiveinformation electronically over the internet. The aim was to find general guidelines for howcompanies and organizations should manage and send sensitive information over insecurenetworks. This led us to our research question: How can information be exchanged betweenactors in geographically diverse areas be categorized and encrypted so that it can be transportedover the internet without security or integrity deficiencies?To answer the question, there was a case study at a defense company.

Hur uppfattas riskinformationsbroschyrer? - teoretisk analys och experimentell studie av riskinformation

Information about the risks involved shall be distributed to the people living in the area nearby to potentially dangerous installation. Swedish law stipulates strict requirements on what information should be supplied, but the law itself does not give any guidance on presentation. The main purpose of the study is to give recommendations on how to improve the information brochures. Within the study, eight people working with risk information have been interviewed and seven different risk information brochures have been studied. Also, a theoretical analysis and a practical experiment were performed using brochures from two municipalities.

To derive quality from quantity

The purpose of this master thesis is to present a model that illuminates the important factors when deriving technical information from market data within a company. For companies to be able to become and stay competitive in the market, product quality is an important factor. Whilst good product quality leads to customer satisfaction and loyalty, lack of quality brings costs in service and replacements. To improve product quality, the developers need information and knowledge about what quality issues affect existing products. Most companies gather data from market about known issues, but in order eliminate known quality issues in new products; this data has to be transformed into information and knowledge.

HelpSeat

The Smart Grid technology has during the last decade been established as a way to create a greater flexibility on the electricity grid that will be needed as the development moves towards an increased share of renewable primary energy sources in the electricity production. One part of the Smart Grid technology is the ability to shift loads in time, to adapt to either price or emissions, known as Demand Response. This project, which was conducted at KTH in collaboration with the consulting corporation Capgemini, examines the economic, environmental and social aspects of the Demand Response technology. In the project, three household products are used in a model that derives the potential savings in costs and emissions of CO2e. The results show that the actual savings measured in SEK are small, but that the savings measured in percent can be as high as 20 percent. Reduction of CO2e emissions is slightly lower.

<- Föregående sida 7 Nästa sida ->