Sökresultat:
9591 Uppsatser om Network File System - Sida 1 av 640
Social fildelning på arbetsplatsen : Traditionell och social fildelning
This paper describes how files and information can be shared in organisations and workplaces. We studied and compared the traditional file sharing in Microsoft Active Directory and the Social file sharing that comes with Microsoft SharePoint Sites. We used qualitative studies based on interviews with system administrators, management and by our own observations to acquire the necessary data. Using independent research, we were able to analyze the data and show the general difference between the traditional and the social file sharing systems. Social file sharing enables the user to easily store and share files in a flexible online environment.
Jämförelse av nätverksfilsystemsprotokoll i Windowsmiljö
Detta arbete handlar om nätverksfilsystemsprotokollen SMB/CIFS, SMB2 och NFSv3. Arbetet baseras på artikeln ?A New Network File System is Born: Comparison of SMB2, CIFS, and NFS? som skrivits av Steven M. French på IBM, Samba Team. I den artikeln saknas det prestandatester och därför känns det relevant att göra prestandatester för att få fram vilket protokoll som har högst hastighet med olika filstorlekar i Windowsmiljö.
Forensic Carving from Unallocated Space
Computer Forensics investigations have become more and more common while investigating IT-related issues. From experience, hard disks, USB thumb, memory sticks contains information that might be useful. Computer Forensics is regulary conducted by Police, Customs, Tax investigators but also within private companies and organisations. However, there are areas within the storage device that are not part of the organisied structure that a file system gives. The reason for that might be that the information has been erased by intention, a virus destroyed the file system and so on.
Forensic Carving from Unallocated Space
Computer Forensics investigations have become more and more common while
investigating IT-related issues. From experience, hard disks, USB thumb, memory
sticks contains information that might be useful. Computer Forensics is
regulary conducted by Police, Customs, Tax investigators but also within
private companies and organisations. However, there are areas within the
storage device that are not part of the organisied structure that a file system
gives. The reason for that might be that the information has been erased by
intention, a virus destroyed the file system and so on.
Lan File Share : Ett fildelningssystem åt Försvarsmakten
The Swedish Armed Force has a need to streamline the preparation of an exercise in tactical training for soldiers because the preparation of an exercise is currently laborious and time consuming when commanders manually share files to each computer that will be included in the exercise. The degree project was to create a file sharing program within the internal network of the Defence Forces? international centre (Swedint). The program is used by the training management to effectively start up an exercise where soldiers train tactical training in a simulated combat environment. The training management use this program to upload files to a server which notifies all the computers on the network to download these files.
Är det en anka eller en kanin? - Fildelning som brott eller uppror, rätt eller fel
The purpose of this paper has been to explore how Swedish users of the file-sharing software Direct Connect perceive their own situation and the file-sharing phenomenon. In addition to ascertain what attitudes prevail in the file-sharing culture and what knowledge file-sharers have regarding the relevant Swedish legislation. The questions central to my area of interest were: - Why do file-sharers use the program Direct Connect? - What knowledge do file-sharers have of the relevant legislation in Sweden? - What attitudes prevail in the file-sharing culture? - Is file-sharing behaviour affected by an individuals experience and/or level of knowledge? I compared the results of my survey with earlier surveys done. In addition I compared categories within the file-sharing group such as gender, age, experience and level of knowledge to determine if there were any patterns within or differences between the groups.
Flexibel ljudinspelning för talkvalitetsanalys
This report describes how wavefiles can be recorded with programs written in the C++ language . The report also describes how the recorded sound is handled before it can be analyzed. The report describes the different parts that make a wave file to a wave file and how Windows handle these files. There is always some silence or noise of unknown length that passes through the system before some interesting sound arrives. That silence or nose must not be recorded and therefore some function must be developed that can detect interesting sound or speech.
Jakten efter den röda tråden : - En studie om hur mobiltelefonen kan integreras i marknadsföringen
Forskningsfra?ga? Hur kan mobiltelefonen integreras i detaljhandelsfo?retags marknadsfo?ring?SyfteSyftet med va?r uppsats a?r att urskilja och analysera likheter och olikheter mellan fo?retag och konsumenter ga?llande marknadsfo?ring med sto?d av mobiltelefonen. Detta go?r vi genom att klarla?gga:Konsumenters upplevda va?rde via mobiltelefonenFo?retags anva?ndning av mobiltelefonen som marknadsfo?ringsresurs MetodUppsatsen har baserats pa? en kvalitativ studie som kommit att anta en deduktiv ansats med inslag av induktion. Vi har gjort den empiriska insamlingen genom semistrukturerade intervjuer da?r vi valt att intervjua tre va?lka?nda fo?retag inom detaljhandelsbranschen samt fokusgrupper.SlutsatsVa?r analys visar att mobiltelefonen kan integreras i detaljhandelsfo?retags marknadsfo?ring pa? olika sa?tt.
Värdeskapande i nätverk
The purpose of this thesis is to examine value creation in networks. Based on a case study of Livebookings Network, an online booking service. This thesis has an explorative nature. As a theoretical framework we use theories on value and network dynamics. By combining these theories we develop an operationalized framework that we use to analyze our empirical findings.
Modularitet och objektorientering : Byggandet av ett program som kan visa en molekyl
The development of IT systems is usually accomplished by some form of system development methodology. It can be performed as the waterfall method, where each phase is completed before the next begins. One of the reasons to follow a development methodology is that the process is more structured, faster and that the product will have higher quality. One risk of not using a system development approach is that the code can be unstructured and difficult to maintain.This paper describes an alternative method in which the development occurred without the use of any system development methodology. This has been possible because there was a clear goal of the program that should be developed.
The Instant Generation : - hur ser ungdomars attityder till fildelning ut?
Abstract:Title: Engelska (Svenska)Number of pages: 40 (47 including appendix)Author: Carl StrandTutor: Göran SvenssonCourse: Media and Communication Studies CPeriod: Fall 2005University: Division of Media and Communication, Department of Information Science, Uppsala UniversityPurpose/Aim: The purpose of this essay is to analyze how young people, in the ages 18 to 25, relate to the subject of file sharing, and what their attitudes to this phenomenon are. I aim to describe how they use file sharing, their knowledge about it, how their usage have changed due to the new copyright law, what their stands are on the question of resource control and management on the Internet, and what they think of the future of file sharing.Material/Method: The method being used is a qualitative focus group interview model, used to investigate how young people look at the subject of file sharing. The results of the interviews is then applied to a theoretical framework based on thoughts of Denis McQuail, Lawrence Lessig concerning creativity, copyright, resource management and file sharing on the InternetMain Results: My conclusion is that the widespread file sharing habits of young people is not only caused by the temptation of getting free stuff, but of the lack of commercial and legal alternatives. Youths are willing to pay for media if the distribution is superior to the illegal file sharing alternative. They are a generation of young people that has grown up in a society where the tendency in many fields has been to make everything faster and more effective.
Implementation av Network Admission Control
This examination work is about implementation of Cisco Systems Network Admission Control (NAC) within a leading IT-company in region of Jönköping. NAC is a technique that is used for securing the internal network from the inside. NAC can verify that the client who connects to the network has the latest antivirus updates and latest operative system hotfixes. Clients who don?t meet the criteria can be placed in quarantine VLAN where they only have access to the update servers.
Lokalisationen av osteochondrosförändringar hos svenska halvblodshästar :
The aetiology of osteochondrosis (OC) is known to be complex and multifactorial. The occurrence of bone fragments in joints and their connection to osteochondral disease are no exception. In the hock and stifle joint of the horse this type of lesion has generally been considered to be of osteochondral origin, while the process behind these fragments in the fetlock joint has been up for discussion.
The objective of this study was to determine the frequency and the localisation of OC in Swedish warmblooded horses. In order to do so all radiographs of stifle, hock and fetlock joints performed on Swedish warmblooded horses during the period of 1992-1999 at Regiondjursjukhuset in Helsingborg were examined and the material was divided into two groups.
Emulerad single sign-on
The goal of the project was to create an extension to Internet Explorer forStatens Tjänstepensionsverk (SPV) which would give the staff the experience ofSingle sign-on (SSO) to external web service providers as well as manage andupdate their passwords in a secure manner. The survey focused on the providersPalasso, ProCompetence and Wera. The extension was created as a BrowserHelper Object (BHO) with C# in .NET. The solution was implemented as aCOM object in a DLL-file that was running in-process with the browser. Theprogram used a locally stored XML file containing URLs, usernames andencrypted passwords to the providers.
Optimala inställningar för MTU vid filöverföring : En utredning i Linuxmiljö baserad på protokoll och filstorlek
Denna uppsats behandlar ämnet filöverföring i ett nätverk. Fokus för arbetet har varit att undersöka MTU:ns inverkan på överföringshastigheten vid filöverföringar baserat på vilket protokoll som används och storleken på filerna som överförs. I arbetet har ett flertal experiment genomförts som syftat till att utreda detta, samt att finna vilket protokoll som överlag presterar bäst baserat på omständigheterna för överföringen. Olika filöverföringsprotokoll, fildistributionsprotokoll, MTU:er samt filstorlekar har testats för att finna vad som resulterar i högst överföringshastighet vid filöverföring över ett Ethernetnätverk. Resultaten visar på att en hög MTU uppnår högst överföringshastighet vid överföring av stora filer, men att en standard-MTU fungerar bättre för att överföra mycket små filer..