Sök:

Sökresultat:

1934 Uppsatser om Network security - Sida 12 av 129

En systemlösning för en framtida fjärrvärmeutbyggnad i Täby : ur Fortum Värmes perspektiv

At the moment in central Täby there are small district heating network operated by Fortum Heat. The distribution network has an annual heat demand of about 70 GWh, which is supported by the network's two plants, Galten and Farmen. Täby as a region is rapidly growing and there are grand plans to develop the area. Estimated market potential for a future district heating expansion in Täby is very high and as early as in 2007 Täby decided to invest in a large-scale expansion. In autumn 2009 Täby did a procurement process, known as the ?Täby initiative?, to find a partner that could implement those expansion plans. To secure a cheap basic production the partner also need to build a power plant at Hagby recycling center. Despite high interest during initial state of the process, only one procurement offer were received and Täby suspended the contract in March the following year.

Överföring av och beräkning med timmätta värden ? från MT2000 till Xpower

New technology makes it possible to remotely measure all consumers in a power network onan hourly basis and store the values in a database.This thesis work describes the conversion process between automatic meter reading systemMActor and calculation software Xpower.Then the possible differences between calculations of power networks using load curves incombination with a yearly estimate of consumption and calculations using hourly measuredvalues is examined.The result of the comparison shows that, for the power network under inspection, nosignificant difference could be noticed. This does not mean that calculations using hourlymeasured values would be unnecessary. I believe that in a near future calculations using hourmeasurements will be the primary choice for many power companies to whom technology isavailable.Also some basic calculations of fundamental power network parameters, such as power factorand loses, are presented using hourly measured distribution transformers in combinations withits hourly measured loads.The report is written in Swedish.

Den levande policyn

In today's changing environment, an increasing number of companies are realizing thebenefits of analyzing business information and thereby stay competitive. By making use ofdecision support systems, known as Business Intelligence (BI), organizations are expected tocollect and process business data and thus get more out of their business.Nowadays it is not enough for organizations to have access to corporate data inside officewalls, they must also be able to bring the information "on the go", which has been thefoundation for the progress of mobile BI solutions. As the mobility increases and thecorporate data leaves the office, new risks arise, which is one reason as to why manycompanies hesitate at the idea of introducing mobile BI solutions.In this paper we explore two security aspects in the area of mobile BI solutions. Our researchquestion is as follows: How does security aspects affect a company's decision to acquiremobile BI solutions? The survey was conducted through interviews in cooperation with thefirm Optivasys, exclusively dedicated to the BI solution QlikView.A significant part of the theory we studied describes security as critical; however, ourresearch suggests a solution on how companies can manage the security aspects.

Lågtempererad fjärrvärme i Umeå

People in today?s society are becoming more and more aware of how important it is to use energy as efficiently as possible. This is clearly noticeable by an increase in home produced heat with e.g. solar panels or heat pumps heating systems. These changing customer demands forces district heating technology to be redesigned, which is why there is an ongoing research regarding the next generation of district heating - low temperature district heating (LTDH).

Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN

This study in political science examines the UN adopted resolution 1970 (2011) andresolution 1973 (2011) on the basis of foreign policy decision-making. The study aims toexplain how the UN principle of Responsibility to Protect came to be legitimized for the firsttime by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspectivethe study attempt to explain Russia and China?s acting in the voting of resolution 1970 andresolution 1973. The background to the conflict in Libya 2011 is presented in the study aswell as the Security Council?s actions during the conflict, from the beginning of the conflictuntil the adoption of resolution 1973.

peer2peer - hur dyrt är gratis?

Detta arbete behandlar de tilläggsprogram som, på senaste tid, börjat spridas med bland annat peer2peerverktyg. Dessa tilläggsprogram, som brukar benämnas spyware alternativt adware, misstänks för att samla in personlig information, så som e-mailadresser och lösenord. Det föreligger en risk att informationen sedan säljs vidare eller används för att exempelvis rikta reklam....

Distribution och försäljning av kvalitetsfuru : en fallstudie

The purpose of this study is to analyse how a distribution and sale-network for quality softwood lumber should be designed to fit sawmilling companies? business concepts, and at the same time satisfy customer needs regarding delivery time and quality aspects. This thesis work is a case study based on a sawmilling and retail company in Sweden. AB Karl Hedin is a private owned sawmilling company with 500 employees. The company?s turnover is 1500 million SEK, it includes 4 sawmills, 16 builders merchants stores and a packaging company.

Den europeiska arresteringsordern : ett rättssäkert förfarande?

The European union started as an area of economic cooperation, but has developed into an area of cooperation in many legal fields. There are these days even cooperation when it comes to dealing with criminals. There is a new procedure called the European arrest warrant which goal is to make the extradition of criminals between the different member states in the European union more efficient. Sometimes when a state receives a European arrest warrant they have to extradite the person in question without doing any investigation of their own. The procedure is based on the principle of mutual recognition.

Bristfällig säkerhet inom trådlösa routrar med fokus på WPS

I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner..

Kommunikationslösningar i molnet : Examensarbete angående olika nätverkslösningar i WAN

Att koppla samman nätverk över geografiskt olika platser har blivit allt vanligare i dagens samhälle. Rapporten kommer belysa olika WAN-lösningar för att göra detta möjligt. De olika lösningar som kommer belysas i denna rapport är att hyra egen fiber, lager2-länk, MPLS och även VPN. Det kommer göras jämförelser mellan dessa lösningar när det gäller kostnad, säkerhet, hastighet och tillförlitlighet. Detta har gjorts med vetenskapliga artiklar och intervjuer men rapporten innefattar även en praktisk tillämpling i form av ett experiment..

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

"Ett artigt pennekrig" En biografisk studie av Gustaf Montgomerys nätverk och författarskap under en period av ideologisk förändring och nya roller för författare 1812-1842

Studies of networks, fields and of communicative circulations complement each other. This master thesis is a biographical study of an author and journalist, Gustaf Montgomery GM, his network in Sweden of the early 19th century, and a study of his authorship and literary career. The starting-point of the study is GM:s change of field from the conservative to the liberal in 1832. The aim is to give explanations to this change and to describe how the change in turn effected the network. The method used is critical of sources.

Hantering av QoS i Distribuerade MPEG-videosystem

With the advance in computer and network technologies, multimedia systems and Internet applications are becoming more popular. As broadband network is prevailing, more clients are able to watch streaming videos or to play multimedia data over the Internet in real-time. Consequently, there is an increasing demand in the Internet for streaming video systems. As the run-time environment of such applications tends to be dynamic, it is imperative to handle transient overloads effectively. The goal of this work is to develop an algorithm that would provide a robust and controlled behavior of the video system so that important data is delivered on time to the video clients.

VARN  Ett nätverksbaserat 2D-actionmultiplayerspel skrivet i Java.

VARN A network multiplayer 2D action game written in Java. All games that support any form of play across networks is in one way or another affected by the delay, or "ping", that occurs from the time it takes for information to travel over the wires. Not only does it take time, it varies depending on how far away the connected partner is and the current status of the network you are on. Through the years a lot of different methods have been developed to combat these delays. I have reviewed some of these methods and implemented a synchronization system in Java meant to be used in online action multiplayer games..

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

<- Föregående sida 12 Nästa sida ->