Sökresultat:
9591 Uppsatser om Network File System - Sida 10 av 640
Så designar du användarvänliga interna kommunikationsnätverk
Companys usually have intern communication platforms where employees can gather information and communicate with eachother. These networks are not public which leads to less resources spent on development. If this network is also used as a work tool may inadequate usability decrease work effeciency. Thats why we, by using known design principles, evaluated an already existing network of this kind along with interviews and think out loud tasks for users. Four users had to do some tasks while they explained how they went through step by step to solve those. This report culminates into a couple of guidelines which can be used to create a user friendly network. The problems that prevented users to feel in control when working resulted in the following guidelines: Create shortcuts of frequently used functions.
Varför barn får kontaktperson och kontaktfamilj : En aktstudie om barnens bakgrund och skäl till insats
The aim of this study was to look into why children receive the interventions contact person and contact family. This was done by studying case-files. The main questions were:- How common is it that there are reasons for the intervention linked to parents and which are the most common?- How common is it that there are reasons for the intervention and problems linked to children and which are the most common?- Is there any indication of connections between reasons, age, gender or type of intervention? If so, what are the connections?The main results of this study were that most of the children lived with a single mother, often with a weak social network, and in need of relief. It was more common that reasons were linked to children then parents and the most common reasons indicated a need for an extra adult.
Diskkrypteringsprestanda i GNU/Linux
This thesis compares the impact on disk performance in a GNU/Linux environmentwith three encryption algorithms: AES, Serpent and Twofish in three different implementations: DM-crypt, Loop-AES and Truecrypt. For all three algorithms a key length of 256 bits is used.The thesis shows that the least performance impact during data encryption, and thus file writing, is reached by using AES or Twofish encryption implemented in DM-crypt or TrueCrypt. The thesis shows that some data operations with a sufficiently low processor utilization barely affects disk performance at all if encrypted using the optimal implementation and algorithm.It is also discovered that the performance impact during data decryption, or file reading, can be minimized by using the most efficient implementation and algorithm. The best results are met with the AES or Twofish cipher, regardless of implementation.An important conclusion that is drawn is that it is hard to determine a superior encryption solution for all purposes. However, by reviewing and examining the collected data from all aspects of disk performance the AES implementation in TrueCrypt is, with small marginals, determined to be the most optimal..
Demokrati i nätverk : eller att shoppa demokrati
Abstract D Level Essay in Political Science, Spring Semester 2010 by Sangrid von Zedtwitz-Liebenstein. Tutor: Malin Stegmann McCallion. ?Democratic Accountability in Networks? The aim of this study is to highlight the problem of the democratic deficit in the private-public partnerships in Sweden. This is a comparative case study with four ideal types.
Kliniskt datainsamlingssystem med beslutsstöd - Användarutredning och gränssnitt för Sahlgrenskas akutintag
Extra high requirements are made on all systems in health care that they are functional and usable,´something, however, that is not always the case. At Emergency Admissions at Sahlgrenska University´Hospital many systems are in use at the same time and it happens that much overhead is caused by having to fill in the same information in different places. In addition, data that is gathered is to a large extent saved in free text format, which means that it cannot be used in a larger context such as research, quality control or for decision support. Data is saved in the patient file only for the treatment process of the individual patient.A data collecting system with decision support functionality could be a first step towards reducing Emergency Admissions? costs and patients? waiting times by providing a structured method of data collection.
Gulliver Simulation - En systemarkitektur f or n atverkssimulering av
Nowadays, a lot of resources are spent on developing systems that will make it possible forvehicles to act autonomously, and make them more effective. One of the projects that isworking on this is the Gulliver Project. Gulliver has constructed a number of miniaturevehicles equipped with various sensors, to use as a physical testbed for autonomousdriving. One big disadvantage with this method is the long iteration time that occursduring the development and testing of a new software.This project has improved this process by developing a system architecture of a virtualtestbed where it is possible to simulate autonomus vehicles that communicates throughany type of wireless network. The testbed has made it possible to simulate autonomusvehicle systems that with a reasonable margin of error, acts like the system would actin a physical test.
European Union Politics ? en tidskrift och dess invisible college
Author Cocitation Analysis (ACA), multidimensional scaling (MDS) and Social Network Analysis (SNA), has been used to analyze and visualize the invisible college of the journal European Union Politics. The concept invisible college was first introduced in the fifteenth century, through the creation of the ?the Royal Society of London?, and it was reintroduced in the 1960:ies and the 1970:ies by scholars such as Price and Crane. It is said to have been interpreted in as many ways as there are authors who have used it. Here it has been used synonymously with the term citation network.
Föräldraskap och neuropsykiatriskt funktionshinder : upplevelse och påverkan av diagnos
The aim in the study is to search for a deeper understanding of how parents experience a neurological diagnose of the child and how this affects the parenthood. Parenthood was seen in a systemtheoretical perspective as a social construction. The narrative method was used in two lifestory parentinterviews. The analysis was made from parenthood. The result formed stories about parenthood with children having neuropsyciatric functional disability who even came to be a woman?s struggle.
?Man bara är en vanlig människa tillsammans med andravanliga människor, och det är väldigt skönt.? : Erfarenheter av det informella sociala nätverket hos personer med en psykosdiagnos
Purpose:mental illness and the effect it has on individuals social network and relationships, and vice versa.The purpose of this study is to shed light on the rarely mentioned subject of severe Method:analysis was performed on a total of 15 interviews, which consists of three individuals with severe mental illness. The focus of the study was the subjects? description of the social network, excluding clinicians and other professionals.This study is inspired and conducted in a Grounded Theory manner. A secondaryFindings:may it be with specific individuals or groups. They describe the importance of surrounding themselves with people who do not judge them and it is through them they get validated.Places have been emphasised as having special meaning for the social interaction and overall wellbeing for the subjects.There is active actions for social interactions/relationships taken by the subjects,Conclusion:their social network.
DNS prestanda
Use of computers and computer networks is nowadays a part of everyday life. You do not use them only at home when you sit at you computer, but you can use them all the time everywhere. This can involve everything from surf to any website when you are at home, to checking your email on your mobile when you are on your way to work. Most people do not think about how it really works when they try to access a web page by typing the address into their browser, but something that most people probably notice is how long it can sometimes take to access a web page.All items which are directly connected to the IP network have a unique IP address that is used to make it possible to communicate. The IP address is either a period separated sequence of digits representing 32 bits or a colon separated sequence of digits representing 128 bits, depending on whether the address is an IPv4 or IPv6 address.
Fördröjning och bortfall av nätverkskorrektioner : osäkerhetskällor för nätverks-RTK
Network RTK is a real-time technique for accurate positioning with Global Navigation Satellite Systems (GNSS). The technology means the use of correction data from a network of GNSS receivers with known positions (reference stations) to reduce the uncertainty in position for the user´s GNSS receiver (rover). However, this requires that the correction data can be transferred seamlessly to the user in real time. Commonly the corrections are transferred via mobile phones. The Swedish National Land Survey operates a nationwide Network RTK service, where users can receive correction data via GSM or mobile Internet (GPRS).
Den första inblicken i regionala företagarföreningar : En fallstudie av Örebro Promotion
Many studies have been conducted of different types of business networks in recent years. Despite this, there is a lack of research concerning industry-transcending formal networks which are limited to a specific region. We have conducted a case study of Örebro Promotion, which is an industry-transcending network including over 500 members. Örebro is a medium-sized city in the middle of Sweden. The purpose with our study is to create an understanding of why enterprises choose to be a part of the network and what they feel is the gain of their membership.
Att utveckla medicintekniska informationssystem på rätt sätt : En studie om regulatoriska aspekters påverkan på systemutveckling och IT-innovation inom hälso- och sjukvård
IT is often seen as a solution to many problems concerning effectiveness in organizations. Information systems within the healthcare sector is often viewed as medical devices rather than just systems or services. These medical devices are thoroughly regulated by laws, standards and certifications. In this study I participated in an innovative project that aimed to bring new life and use to the old fashioned patient journal by giving it a visual representation through the use of an avatar. I aimed to study the effects of regulators connected with the patient journal as a source of information for the innovative project.
Nätverksövervakning : En jämförelse av Sensu och op5 Monitor
Rapporten beskriver arbetet och resultaten av en jämförelse mellan Sensu och op5 Monitor, vilka är verktyg som används för att övervaka enheter i nätverk, så kallade network monitoring systems. Arbetet har utförts för att utbudet av nätverksövervakningsverktyg ständigt växer och det ansågs värdefullt att jämföra en ny aktör med ett äldre verktyg som är byggd på ett annat tankesätt. Det som ansågs intressant att testa var hur dessa verktyg hanterade de rapporter som skapades och samlades in, om det slutgiltiga resultatet från detta skulle skilja sig åt eller inte. För att testa detta sattes en virtuell testmiljö upp, där Sensu och op5 Monitor rullade parallellt med varandra och övervakade samma system och använde sig utav samma plugin för övervakningen. Experimenten utfördes på två stycken tjänster, BIND9 samt Apache2, i och med att de två pluginen som användes var uppbyggda på olika sätt konstruerades även olika experiment.
Managing Positions in a Dynamic Environment - New Technology Impact on Tactel and the Telecom Industry
The Telecom industry is facing a paradigm shift, where the industry is converging with Internet technologies and the market is becoming more sophisticated. This results in more demanding customers, and the need for offering more content and services with a focus on usability for the end-users. The operators are starting to loose both their strong position and revenue in the Telecom industry, due to new technology and the fact that other actors are starting to enter the market, offering new content and services. In the end, the operators have two choices, to become bit-pipe providers, and only focusing on network management, or keeping the control over their networks. The latter would mean that they block other actors who are taking parts of their revenue, e.g.