Sökresultat:
2745 Uppsatser om Network Access Protection - Sida 10 av 183
Delårsrapporter - osäkerheter och bedömningar i praktiken
certain building or environment can get a protection as a notable building if it contains certainvalues. These values are established by a certain category of people from the cultural sector.These people use established criterions to define the cultural value of the object. The objects canbe evaluated differently depending on who has done the evaluation. The people who protect thecultural environment and choose which buildings that are to be defining as notable buildingsoften uses a special model to characterise the different cultural values. This model is produced bya man called Axel Unnerbäck.
Utvärdering av övervakningsapplikationen DMCG i SL Access
Syftet med detta examensarbete ?Utvärdering av övervakningsapplikation DMCG i SL Access? är att vara ett underlag för en ny version av programmet. En kartläggning av applikationens uppbyggnad, funktionalitet och gränssnitt gjordes. Synpunkter och förslag från operatörer som använder programmet samlades in och sammanfattas i rapporten.Den nuvarande versionen av programmet har ett antal brister i de tre områdena. Detta presenteras i examensarbetet så att SL kan använda detta för att skriva ett ändringsförslag till leverantören ERG.
En kvalitativ studie om före detta kriminellas upplevelser av stöd och hjälp.
The aim of this study was to examine former criminals? experiences of help and support of importance to leave a criminal life style. The study consists of six interviews with former criminals and earlier studies on the subject. These studies show that relapse in crime are most common among those who are socially excluded from society. They also show that important factors to end a life in criminality are for example a supportive social network.
Att Införa IPv6 i ett IPv4-nätverk
Internet is growing every day and this is leading to an address depletion of the current IPv4 addresses. A new version of IPv4, called IPv6, is the protocol for addressing computers that will deal with this problem. IPv4 and IPv6 are unfortunately not compatible with each other. IPv4 and IPv6 have to co-exist for a long time until IPv6 will be the dominant protocol.The purpose of this thesis is to examine how a transition could be done or more correctly, how to deploy IPv6 in an already existing IPv4 network. After that part of the report a case study at the local Internet service provider Junet AB will be conducted.
How Venture Capitalists can use their Network in order to reduce the Information Asymmetries between themselves and the Venture Management Team
The purpose of this study is to increase the understanding of how venture capitalists can use their network in order to reduce information asymmetries between themselves and the venture management team. A qualitative approach with semi-structured interviews, consisting of open questions, have been used to receive gradate information in order to reach our explorative purpose. Our theoretical framework consists of relevant studies made on the dynamics of networks and the problems that can arise in the complex relationship between a principal and an agent. We have been interviewing two venture capital firms and therepresentatives from two business angel networks. We also made an additional interview with an influential financial actor in order to try to verify our conclusions Our conclusions are that an extensive network can be used by venture capitalists in order to; verify ventures? technologies, complement the competences in the venture management team, and arrange co-investments, resulting in reduced information asymmetries between themselves and the venture management team.
Sociala medier : Arbetsgivares möjligheter skydda sig mot vad arbetstagare skriver i sociala medier
The main purpose of this essay is to investigate the legal position for employers concerning protection against what employees can express about one?s employer in social media.It may regard dissatisfaction concerning employment, tort or so-called whistleblowing. The spread through social media may be comprehensive and thus cause more damage to the employer.Employees within the public sector as well as in the private are protected by the liberty of speech, which is constitutional, even the protection of sources or the right to criticize can offer some protection. This gives the employees the possibility to widely express themselves in private social media as long as it can?t be classified as a violation, which per se is very rare.However, certain differences between the both sectors will be pointed out.There are still no constitutional rights regarding social media, but a grey area has emerged concerning the legal position.
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..
Tillförlitlighet i Stockholms elnät : En analys med hjälp av Tekla NIS
Outages in the electric grid can be costly for society. Because of this, reliability is one of the parameters used to regulate network companies. Reliability in electrical grids can be measured with SAIDI, system average interruption duration index, which for Fortum Distribution has increased in Stockholm?s distribution network (11 kV) in the early 2000?s.By using outage data for Stockholm from 2011-2013, sets of parameters to be used for reliability calculations in the network information program Tekla NIS were derived. Two different options for investment were then analysed: changing old cables with high fault frequencies, and installing automatic switching in distribution substations.
Byggnadsminnen och dess försvarbarhet över tid
certain building or environment can get a protection as a notable building if it contains certainvalues. These values are established by a certain category of people from the cultural sector.These people use established criterions to define the cultural value of the object. The objects canbe evaluated differently depending on who has done the evaluation. The people who protect thecultural environment and choose which buildings that are to be defining as notable buildingsoften uses a special model to characterise the different cultural values. This model is produced bya man called Axel Unnerbäck.
Attityder till Open Access vid Umeå universitet
Detta är en utvärdering av hur väl Open Access mottagits av forskare vid humanistisk fakultet vidUmeå universitet. Empirin är samlad med hjälp av kvalitativ intervjumetod, intervjuerna hölls med ettantal forskare vid humanistiska fakulteten. Genom en sammanfattning av hur vetenskapligapublikationer har sett ut och förändrats genom historien går det att se att utvecklingen rör sig mot OpenAccess. Eftersom att det i dagsläget (2012) utformas nationell policy kring Open Access samt attforskningsfinansiärer börjar ställa krav på att forskare ska publicera sina forskningsresultat i OpenAccess ? är det intressant att se hur väl Open Access mottagits av forskare eftersom det är de som stårför själva produktionen av materialet.
PRESTIGE, KARRIÄR OCH OPEN ACCESS Forskares syn på publicering i vetenskapliga tidskrifter
Dissatisfaction with the current market for scientific publishing, dominated by a few large publishers able to obtain high subscription fees, gave birth to the Open Access movement. One problem for the Open Access movement, which aims at making research results freely available, is that scientists are reluctant to publish in journals that are free on the Internet, so called Open Access journals. This master's thesis aims at showing how scientists reason about their own publishing in scientific journals. It is investigated which factors are important when scientist decide on which journals to send their articles. The aim is to increase the understanding of scientists' views on Open Access.Six interviews were conducted with scientists in Biomedicine at Lund University.
Intelligenta Switchar
This master thesis has been carried out on behalf of Stoneridge Electronics AB and is an investigation ofhow intelligent switches can replace the traditionally used direct controlled switches. The concept ofintelligent switches is that the switches contain electronic identification components which, by connectingthem to a network, give the same function independent of the location of the switch. This infers anincreased flexibility and configurability which can be a great advantage in development, production andcustomization in the commercial vehicle industry. Especially in the current situation when commercialvehicle manufacturers provides more and more functions and dashboard configurations.LIN (Local Interconnect Network) is a network protocol introduced in 1999. It is a simpler and lower costcomplement to CAN (Controller Area Network) and is adapted for applications where the demands forbandwidth are lower, for example reading sensors and switchers.
Pratbubblan: den röda tråden : En studie av Karlstads Stadsnäts visuella kommunikation
The purpose of this study is to investigate whether Karlstad City Fiber Network visual elements in the form of a pair of speech bubbles fit into the organization's holistic external communication and branding. The study examines whether Karlstad City Fiber Network image of the organization and the speech bubbles match the stakeholders view and how the visual elements are perceived and recognized by stakeholders. The theory associated with the study is theories of corporate visual identity, image, identity and branding and visual communication. These three elements are important to be aware of when a generation of an effective external communications. Qualitative interviews with employees at Karlstad City Fiber Network and Karlstad municipality has undertaken to give an idea of ??what the organization wants to achieve and what their opinions are.
Doktoranders förhållningssätt till Open Access: En studie av epistemiska kulturers betydelse för doktoranders tankar kring vetenskaplig publicering
The aim of this bachelor-thesis is to study how postgraduates approach open access during times of change within scholarly communication. Our theoretical framework is based upon Knorr Cetinas epistemic cultures and Cullen & Chawners theory that there is a paradigmatic conflict within scholarly communication due to the fact that open access has failed to reach the same level of prominence among researchers as it has within research libraries. We interviewed six postgraduates at Malmö högskola in order to find answers to our research questions. We identified a shared epistemic culture among the postgraduates, which can be explained by the fact that being postgraduates, they all share similar experiences and values. We chose to call this epistemic culture the horizontal epistemic culture.
Ja eller nej till filter? En kvalitativ undersökning i frågan om svenska folkbibliotek bör filtrera Internet eller ej.
The focus of this work is to study whether public libraries should offer their patrons unlimited access to the Internet, or restrict which sites they can visit. The most common tool used to limit Internet access is filtering software. The author has administered four interviews with public librarians working in libraries in Southern Sweden. All four librarians had different opinions about restricting Internet access. The most important question asked was if they had chosen to use filtering, and the reasons for their decision.