Sök:

Sökresultat:

9591 Uppsatser om Network File System - Sida 8 av 640

Gränslösa nätverk : En studie av företags internationalisering till Kina ur ett nätverksperspektiv

This thesis follows a qualitative method and aim to describe firms? international business at an emerging market seen from a network perspective. The purpose of the thesis is to study in what way business relations and networks influence the process of internationalization and describe the way in which companies handle the external network in relation to acquisitions. Further does our purpose include analyzing if a firm?s network may be the main factor for why international business occurs.


Nätnyttomodellens fall och framtidens reglering av eltransmissionstariffer : Tidigare meningsskiljaktigheter samt undersökning av förutsättningar för framtida reglering

The main ambition of this degree project is to illustrate the fundamental problems of today?s electric tariff regulation and the usage of the analyzing tool; The Network Tariff Model. There is a further discussion of potential problems and clear improvements of the 2012 years proposed network tariff regulation. Interviews have been conducted with specific network companies and Energimarknadsinspektionen. The proposed regulation of 2012 is discussed from the government?s proposition.This paper clearly shows that the authority´s work has been conducted in a very unprofessional manner during the period of The Network Tariff Model.

Lokal Nätverkssäkerhet - experimentell studie av Microsoft Network Access Protection

Den här rapporten beskriver en experimentell studie av Microsoft Network Protection (NAP) och är ämnad för att utvärdera hur mogen tekniken är för att implementeras i en aktiv nätverksmiljö. För att göra studien tog vi hjälp av gymnasieskolan John Bauer i Kalmar. Tester har utförts med DHCP-framtvingning och 802. 1x-framtvingning, dessa är två av NAPs fyra olika framtvingande funktioner. En mindre analys av skolans switchkonfigurationer och interna säkerhet har även gjorts på John Bauers begäran.

Studie av glasfasader för kommersiella byggnader

Den klassiska approachen till navigering innefattar att agenten håller en intern representativ modell av omgivningen. Denna approach har emellertid många nackdelar, speciellt för dynamiska miljöer. En modernare approach är att förlita sig på den faktiska omgivningen istället för en modell av denna. Detta arbete presenterar en undersökning av navigeringsproblemet och hur väl det löses av agenter vars kontrollmekanismer utgörs artificiella neurala nätverk. Tillförlitligheten hos de två neurala arkitekturerna Extended sequential cascaded network och Self-organized recurrent network bestäms genom experiment.

Analys av QoS i mellanvaran Meteor

This thesis is closely related to the Dynamically Self-Configuring Automotive System(DySCAS) project. DySCAS is a middleware for electronics in an automotive system. Thethesis work has been performed in cooperation with ENEA. Parts of the demonstrationplatform Self configurable High Availability and Policy based platform for Embeddedsystem (SHAPE) developed for the DySCAS project by ENEA have been used in theimplementation phase of this master thesis.The goal of this thesis was to evaluate how the Meteor MW, an offspring of the DySCASmiddleware, should handle QoS and to design a Quality of Service Manager (QoSM) for theMeteor MW that fulfilled hard real-time requirements. The thesis also had the objectiveof analysing and identifying the requirements on such a QoSM from a QoS perspective.Specifically the requirements to guarantee real-time support for applications running onthe MW.

Nätverksdemokrati -vad bör, är, kan den vara

The main objective of the essay is to define the meaning of the termgovernance network on the basis of democratic values ? both normative andimperial - with the aim to analyse the prospects to develop an effective anddemocratic governance. Democratic values as well as civil participation,enlightenment, responsibility and approachability are discussed, but also moreeffectivness orientated values.It is clear from the presentation how normative and democracy models putdifferent values in focus, with the consequence that other values are played downor pushed aside. Compared to imperial research in partnership ? by definition atype of network arrangement - and with a starting point in democracy andefficiency, the networks are discussed as political formation.In what sense can the actual existing network arrangements meet and fulfil thedefined political values? As no straight forward answer exists, there is an ongoingconflict between the political demand for slowness and the effectiveness demandfor flexibility and mobility..

Pilotinstallation av fast och fjärravläst nätstationsmätning : Identifiering av för- och nackdelar med nätstationsmätning, Mälarenergi Elnät AB

Today?s electrical grid companies understand that better knowledge of and information about their grid can help realize a smart grid network. One way to gain better knowledge and information about the low voltage network is to install measuring equipment on the substation transformer´s secondary low voltage side that measures the low voltage network losses for that specific substation. By doing so, grid companies can, due to the calculation of the low voltage network losses, identify and address issues such as illegal power dissipation, unmeasured power outtakes, and unsatisfied technical documentation for the substations low voltage network.During 2012, Mälarenergi Elnät AB had a total electrical network loss (both medium and low voltage network losses included) of three to four percent of their total distributed electrical volume. Converting this energy volume into a monetary figure this accounts for a loss of around 30 million Swedish crowns.

Gruppverksamhet för barn till missbrukare : en jämförande studie av två gruppmodeller

In Sweden approximately ten percent of all children grows up in a family where at least one parent is having an alcohol related addiction. Since 1998 the development of group activities for children in this situation has been immense. The aim of group activities is to break the child's isolation and make them feel that they are not lonely in their experiences, give them knowledge about addiction and relive the pressure of guilt and responsibility.In a comparative study we examined studied how two different group activity models one with the conception of illness and one without, use the children's network to support the group process. The aim was also to find each models definition of the "normal family", since we understood the groupactivity as a part in the normalization process. We reached our aim through interviews with group leaders and by literature studies.

En kvalitativ studie om före detta kriminellas upplevelser av stöd och hjälp.

The aim of this study was to examine former criminals? experiences of help and support of importance to leave a criminal life style. The study consists of six interviews with former criminals and earlier studies on the subject. These studies show that relapse in crime are most common among those who are socially excluded from society. They also show that important factors to end a life in criminality are for example a supportive social network.

Att Införa IPv6 i ett IPv4-nätverk

Internet is growing every day and this is leading to an address depletion of the current IPv4 addresses. A new version of IPv4, called IPv6, is the protocol for addressing computers that will deal with this problem. IPv4 and IPv6 are unfortunately not compatible with each other. IPv4 and IPv6 have to co-exist for a long time until IPv6 will be the dominant protocol.The purpose of this thesis is to examine how a transition could be done or more correctly, how to deploy IPv6 in an already existing IPv4 network. After that part of the report a case study at the local Internet service provider Junet AB will be conducted.

How Venture Capitalists can use their Network in order to reduce the Information Asymmetries between themselves and the Venture Management Team

The purpose of this study is to increase the understanding of how venture capitalists can use their network in order to reduce information asymmetries between themselves and the venture management team. A qualitative approach with semi-structured interviews, consisting of open questions, have been used to receive gradate information in order to reach our explorative purpose. Our theoretical framework consists of relevant studies made on the dynamics of networks and the problems that can arise in the complex relationship between a principal and an agent. We have been interviewing two venture capital firms and therepresentatives from two business angel networks. We also made an additional interview with an influential financial actor in order to try to verify our conclusions Our conclusions are that an extensive network can be used by venture capitalists in order to; verify ventures? technologies, complement the competences in the venture management team, and arrange co-investments, resulting in reduced information asymmetries between themselves and the venture management team.

Design and implementation of a 5GHz radio front-end module

The overall goal of this diploma work is to produce a design of a 5 GHz radio frontend using Agilent Advanced Design System (ADS) and then build a working prototype. Using this prototype to determine if RF circuits at 5 GHz can be successfully produced using distributed components on a laminate substrate. The design process for the radio front-end consists of two stages. In the first stage the distributed components are designed and simulated, and in the second stage all components are merged into a PCB. This PCB is then manufactured and assembled.

Nätverkssäkerhet med IPS : Förbättrad nätverkssäkerhet med Intrusion Prevention Systems

Att skydda sin IT-miljö mot olika typer av intrång och attacker som till exempel trojaner,skadliga Java applets eller DoS attacker med hjälp av brandväggar och antivirusprogramär två viktiga lager i skalskyddet.I den här uppsatsen undersöks hur väl ett Intrusion Prevention System skulle kunna fungera som ett ytterligare lager i skalskyddet. Fokus ligger på hur väl IPS-systemet klarar av att avvärja attacker, hur mycket tid som går åt till konfigurering och drift för att få ett fungerande IPS samt hur prestandan i nätverket påverkas av implementationen. För att mäta hur väl IPS systemet klarar av att upptäcka och blockera attacker utförs två experiment där ett mindre nätverk attackeras på olika sätt. I det första experimentet skyddas infrastrukturen av en brandvägg och klienterna är utrustade med antivirusprogram. I det andra experimentet genomförs samma attacker igen fast med ett Snort IPS implementerat i nätverket.Resultatet av de genomförda experimenten visar att en IPS klarar att blockera ca 87% av attackerna, men nätverksprestandan påverkas negativt.

Att katalogisera en specialsamling med hjälp av TEI: En metodprövande studie utförd på Swedenborgsarkivet i Kungl. Vetenskapsakademien

In this thesis, the TEI (Text Encoding Initiative) encoding scheme is investigated as a system for storing metadata about manuscript material and 18th century first prints in the Swedenborg Archives at the Swedish Royal Academy of Sciences. The aim of the study is to test the functionality of TEI as a metadata system in cataloguing a special collection. Some criteria of functionality are formulated, and examples of encoded catalogue entries are described and analysed. It is demonstrated how descriptive metadata have been registered within the TEI header, while structural metadata have been recorded within the text element of the TEI file. On the whole, TEI is considered to be a functional tool that matches the present purposes.

<- Föregående sida 8 Nästa sida ->