Sök:

Sökresultat:

2745 Uppsatser om Network Access Protection - Sida 38 av 183

Barn kommunicerar om film

The aim of this master?s thesis is to obtain greater understanding of how children relate to the film medium and their experiences. This is obtained by listening to the children and observing their verbal and nonverbal communication in two focus group interviews. Children?s access to and selection of film are due to adult?s restrictions.

Vilken mjukvarubaserad fjärranslutningslösning är passande för ett mindre företag?

 Syftet med denna undersökning är att ta reda på vilken mjukvarubaserad fjärranslutningslösning som passar för ett mindre företag, då de har mindre ekonomiska tillgångar än ett större företag behöver de vara mer noggranna med sina produktval. Arbetet är utfört med litteraturstudier och en enkätundersökning till ett tiotal mindre företag, samt en laborationsmiljö där tester av de olika fjärranslutningslösningarnas egenskaper har utförts.Område valdes då ämnet fjärranslutning knappt behandlads under utbildningstiden, och fördjupar sig därför inom området.Resultatet visar vad mindre företag anser vara de viktigaste egenskaperna med en fjärranslutningslösning. Även de värden som uppkom vid tester i laborationsmiljön kommer att presenteras i resultatet. De samlade resultaten kommer sedan visa på vilken mjukvarubaserad lösning som passar bäst för ett mindre företag. .

Mer säkerhet och mindre frihet med risk att förlora dem båda: En kritisk diskursanalys av lagförslaget till FRA-lagen

The aim of this thesis is to contribute to a better understanding of the FRA-law. The focus of the study is to examine how Swedish politicians relate to the new draft of this law on intelligence. Key themes in the study are security, threats, surveillance and privacy. The power relationship between the individual and the state is also examined. Empirical data used in this study consists of a spoken plenary debate in the House which was held in connection with the adoption of the FRA law in June 2008.

Privatiseringen av de växtgenetiska allmänningarna : Konsekvenserna av regimkomplexet kring växtgenetiska resurser för bönders rättigheter och matsäkerhet

This thesis discusses the global regime complex concerning the management of plant genetic resources for food and agriculture, and how different regimes concerning these resources cooperate or stand in opposition to each other. Because of changes in US patent law and the establishment of TRIPS, patent claims over plant genetic resources has increased dramatically globally. This, amongst other things, in turn has lead to the development of CBD which in turn lead to the creation of access and benefit laws in many countries. To create a free flow of genetic resources for food and agriculture the ITPGRFA, with its multilateral system, were negotiated. The aim of this thesis is to investigate which consequences the regime complex concerning plant genetic resources for food and agriculture can have on the rights of small farmers, agricultural research and food security in the global South.

Karakterisering av bioslam för modellering av biogasproduktion

The report aims to investigate how well a certain type of affordable embedded single board computer can hold up against today's more expensive computers in a computer system by doing various tests on a system with the specified requirements. The system has a Raspberry Pi as the single board computer which task is to control a camera based on coordinates obtained from a server as well as capture and stream a video signal on a network.The researches were conducted to check how much network traffic a single-chip computer sent in different video formats and how much CPU utilization was required. Studies were also made to ensure the accuracy of the camera control. The researches have been experimental, where several tests have been performed and analyzed.The results show that a sufficiently good accuracy can be obtained from the camera steering unit, in which two different servos have been investigated. When the video format MJPEG and H.264 are used, the single-chip computer is able to transmit a video signal up to 1280x720 at 15 fps.

Lika män leka bäst? : En studie om kvinnors hinder vid karriäravancemang.

The research in this thesis attempts to understand what happens when children (3-6 years of age) interact with each other in the context of free play in two pre-school settings when adults are not involved. The aim of the study was to get a closer look at how children create relationships and how they protect and defend their interactional spaces. Data was gathered through ethnographically inspired methodology, using video observation to capture the everyday interactions of the children. Results were analyzed using a phenomenological approach to peer cultures. Previous research suggests that it is very important for children to maintain their interactions with peers and gaining access to play.

Hur upplever gymnasieelever sin informationssökning? En studie på en skola utan tillgång till skolbibliotek

This masters thesis aims to investigate how upper secondary school pupils experience their information seeking in a school context without access to a school library. It is the pupils own thoughts and opinions about information seeking and criticism of the sources that is the main focus. The literature that has been used consists of material from research concerning youth and different aspects of information seeking such as the information seeking process, information seeking on the web, criticism of the sources and how pupils interact with other people in order to acquire information. The method that has been used is group interviews. Twelve pupils from an independent school without access to a school library have been interviewed in groups of three.

Projekthanteringssystem

This document is a summary of my work to create a project management system for a small firm working with computer graphics. The intention is to manage customers, projects, images and invoices in the easiest possible way. To make the system as flexible as possible a web-interface was chosen which makes it possible to access the system from any computer, making it independent of any particular operating system. The only requirement on the user environment is that the computer must have a connection to the Internet to be able to access the system. The different techniques that have been used to develop the project management system is primarily Ruby on Rails and a MySQL database.

Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems

Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet.I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar av att upptäcka och blockera attacker utförs två experiment där ett mindre nätverk attackeras på olika sätt. I det första experimentet skyddas infrastrukturen av en brandvägg och klienterna är utrustade med antivirusprogram. I det andra experimentet genomförs samma attacker igen fast med ett Snort IPS implementerat i nätverket.Resultatet av de genomförda experimenten visar att en IPS klarar att blockera ca 87% av attackerna, men nätverksprestandan påverkas negativt.

Säkerhet i Wireless Local Area Networks : En studie i säkerhetslösningar utförd på uppdrag av Saab Bofors Dynamics AB.

Saab Bofors Dynamics AB is looking for ways to let the employees work wireless in the future. The security in Wireless Local Area Networks (WLAN) has not been considered very reliable, but new standards and protocols have been developed to enhance the security in WLAN. Since most wireless components soon will have built in support for wireless communication, it is important to have a model to deal with secure wireless communication ready. This is necessary because it is important to protect the company?s information related systems, ensure contingency in the daily work and maintaining the trust of the market and the authorities.

The Life and the death of commercail email : En studie av e-postens geografi  med hjälp av Actor Network Theory

Denna studie belyser svårigheten för teknik och virtuell geografi att nå ut till mottagaren genom en kartläggning av e-postens geografi. För att skapa förståelse och fånga den osynliga processen bakom e-postens geografi  utgår uppsatsen dels från teorin Actor Network Theory (ANT) och dels från intervjuer.Under studiens gång uppstod ny förståelse för e-postens komplexitet och ledde fram till en reviderad syn. I början av uppsatsarbetet betraktades e-posten enbart utifrån sin funktion som aktant och intermediarie men i takt med att undersökningen fortgick framkom att den samtidigt, utöver dessa funktioner, fungerar e-posten som ett heterogent nätverk med betydelsefulla komponenter såsom aktörer och aktanter. Enligt uppsatsens konklusioner är e-postens trajektoria beroende av den strategi som producenten använder under skapandet av elektroniska meddelanden. Ett kontinuerligt arbete mellan producent och konsument krävs för att e-postens trajektoria ska upprätthållas och leda fram till att det elektroniska meddelande som löper igenom det virtuella nätverket når sitt syfte..

ACTA-avtalets internetregler : Förenliga med EU:s grundläggande fri-och rättigheter?

In tune with the cross-border trade the infringement of intellectual property rights has become a growing problem in Europe and the rest of the world. In June 2008 negotiations about a new international agreement was initiated between Europe, its member states and ten other countries, which will restrict infringements of intellectual property rights. The agreement is called ACTA, which stands for Anti-Counterfeiting Trade Agreement. On January 26, 2012 the European Union (EU) and twenty-two of its twenty-seven member states signed a letter of intent to the agreement and the EU?s internal processes of the agreement began.

Har ni någon bra bok?: Om biblioteksanställdas användning av readers advisory verktyg

Studies have shown that library employees often choose not to use readers? advisory tools but to instead rely entirely on their own experience, often doing the library user a disservice. However, very few have looked at why this is so. This thesis looks at to what extent thirty individual employees in thirty Swedish public libraries use readers advisory tools when helping a patron find a good book, with the major focus on what motivates them to use these tools and why some choose not to use them. It was found that readers? advisory tools where not used with any consistency and that many things influence the library employees? use of these tools.

Intellectual Property Rights : A Barricade to Technological Development. An Ethical Analysis on the Less Developed Countries

Debate over Intellectual Property Rights ?IPRs? particularly patent and copyrights is mainly on forward-looking industries in computer software. As part of a trade deal reached in 1994, the member nations of the World Trade Organisation must adhere to a global agreement known as TRIPS, for the Trade- Related Aspect of Intellectual Property Rights.This study is to analyse the ethical conception of Intellectual Property Rights and in particular its implications on the developing countries in relation to TRIPS. The approach will be to analyse a broad philosophical theories of property to see if there is any justification for a software program to be treated as private property and also argue base on John Rawls two principles of justice in relation to TRIPS Agreement. Some reflections will be put on the use of open-source software by less developing countries.From the study it was asserted that, strong IPRs protection would hinder technological transfer and indigenous learning activities in the early stage of industrialisation when learning takes place through reverse engineering.

Riskkapital : Roller, Involvering och Värdeskapande

In order to drive innovation and growth in a nation is it important to have innovative companies. Many of those innovative companies are smaller companies, which are in need of capital injections for expansion of its operations or to be able to produce a commercial product. In many cases the banks will not lend because they believe there is too great a risk that they will not get their money back. It is in this situation venture capital becomes interesting. Venture capitalists? see the potential the product and/or entrepreneur possesses and are therefore more willing to take the risk in investing in these companies.

<- Föregående sida 38 Nästa sida ->