Sökresultat:
1557 Uppsatser om Strategic network - Sida 7 av 104
VPN : Virtual Private Network i Windows 2000
Sekretessbelagd.
Nätnyttomodellens fall och framtidens reglering av eltransmissionstariffer : Tidigare meningsskiljaktigheter samt undersökning av förutsättningar för framtida reglering
The main ambition of this degree project is to illustrate the fundamental problems of today?s electric tariff regulation and the usage of the analyzing tool; The Network Tariff Model. There is a further discussion of potential problems and clear improvements of the 2012 years proposed network tariff regulation. Interviews have been conducted with specific network companies and Energimarknadsinspektionen. The proposed regulation of 2012 is discussed from the government?s proposition.This paper clearly shows that the authority´s work has been conducted in a very unprofessional manner during the period of The Network Tariff Model.
Lokal Nätverkssäkerhet - experimentell studie av Microsoft Network Access Protection
Den här rapporten beskriver en experimentell studie av Microsoft Network Protection (NAP) och är ämnad för att utvärdera hur mogen tekniken är för att implementeras i en aktiv nätverksmiljö. För att göra studien tog vi hjälp av gymnasieskolan John Bauer i Kalmar. Tester har utförts med DHCP-framtvingning och 802. 1x-framtvingning, dessa är två av NAPs fyra olika framtvingande funktioner. En mindre analys av skolans switchkonfigurationer och interna säkerhet har även gjorts på John Bauers begäran.
Studie av glasfasader för kommersiella byggnader
Den klassiska approachen till navigering innefattar att agenten håller en intern representativ modell av omgivningen. Denna approach har emellertid många nackdelar, speciellt för dynamiska miljöer. En modernare approach är att förlita sig på den faktiska omgivningen istället för en modell av denna. Detta arbete presenterar en undersökning av navigeringsproblemet och hur väl det löses av agenter vars kontrollmekanismer utgörs artificiella neurala nätverk. Tillförlitligheten hos de två neurala arkitekturerna Extended sequential cascaded network och Self-organized recurrent network bestäms genom experiment.
POLIS, POLIS, REGISTERKRIS : ? en retorisk analys av polisens kriskommunikation i samband med "registerskandalen"
AbstractTitel: Ur elden in i askan. En kvalitativ studie om det sociala nätverkets betydelse för ensamkommande barnKeywords: unaccompanied refugee children, social network, risk and resilience, social work.Authors: Karin Bodå och Leila Silva The main purpose of this study is to illuminate and describe the importance of having a social network for unaccompanied refugee children in Sweden. Using qualitative interviews this study looks at their possibilities to create a social network in Sweden and how their network helps them to solve problems. Knowledge of this subject is important for social workers, in order to be able to encourage and help unaccompanied refugee children to build a social network. The base for our analysis is attachment theory, coping theory, social network theory, KASAM theory, risk and resilience theory, system theory are used to give deeper insight into experiences of four unaccompanied refugee boys.
Ur elden in i askan : En kvalitativ studie om det sociala nätverkets betydelse för ensamkommande barn
AbstractTitel: Ur elden in i askan. En kvalitativ studie om det sociala nätverkets betydelse för ensamkommande barnKeywords: unaccompanied refugee children, social network, risk and resilience, social work.Authors: Karin Bodå och Leila Silva The main purpose of this study is to illuminate and describe the importance of having a social network for unaccompanied refugee children in Sweden. Using qualitative interviews this study looks at their possibilities to create a social network in Sweden and how their network helps them to solve problems. Knowledge of this subject is important for social workers, in order to be able to encourage and help unaccompanied refugee children to build a social network. The base for our analysis is attachment theory, coping theory, social network theory, KASAM theory, risk and resilience theory, system theory are used to give deeper insight into experiences of four unaccompanied refugee boys.
Nätverksdemokrati -vad bör, är, kan den vara
The main objective of the essay is to define the meaning of the termgovernance network on the basis of democratic values ? both normative andimperial - with the aim to analyse the prospects to develop an effective anddemocratic governance. Democratic values as well as civil participation,enlightenment, responsibility and approachability are discussed, but also moreeffectivness orientated values.It is clear from the presentation how normative and democracy models putdifferent values in focus, with the consequence that other values are played downor pushed aside. Compared to imperial research in partnership ? by definition atype of network arrangement - and with a starting point in democracy andefficiency, the networks are discussed as political formation.In what sense can the actual existing network arrangements meet and fulfil thedefined political values? As no straight forward answer exists, there is an ongoingconflict between the political demand for slowness and the effectiveness demandfor flexibility and mobility..
Vikten av säkra nätverk
The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network.
En kvalitativ studie om före detta kriminellas upplevelser av stöd och hjälp.
The aim of this study was to examine former criminals? experiences of help and support of importance to leave a criminal life style. The study consists of six interviews with former criminals and earlier studies on the subject. These studies show that relapse in crime are most common among those who are socially excluded from society. They also show that important factors to end a life in criminality are for example a supportive social network.
Att Införa IPv6 i ett IPv4-nätverk
Internet is growing every day and this is leading to an address depletion of the current IPv4 addresses. A new version of IPv4, called IPv6, is the protocol for addressing computers that will deal with this problem. IPv4 and IPv6 are unfortunately not compatible with each other. IPv4 and IPv6 have to co-exist for a long time until IPv6 will be the dominant protocol.The purpose of this thesis is to examine how a transition could be done or more correctly, how to deploy IPv6 in an already existing IPv4 network. After that part of the report a case study at the local Internet service provider Junet AB will be conducted.
Kulturstrategisk inflytelse på COIN litteratur : Nagl, Kitson och Galula ur ett kulturstrategiskt perspektiv
In studying the art of Counterinsurgency Warfare we are usually inclined to the reading of several books regarding this matter. Because of this some writers have the power to influence the minds of the reader. This can be of great benefit since it enables information sharing and for the reader a chance to learn from the triumphs, but also mistakes of others. However each writer is the creation of the time and context under which he existed. Because of the wheel of time certain things change, and because of the context a myriad of factors came into play affecting the outcome and product of the doings and thoughts of that specific occurrence.
Co-Branding as a Tool for Strategic Brand Activation - How to Find the Ideal Partner; An Explanatory Case Study in the Fashion and Design Sector
Thesis purpose: The purpose of this study is to investigate the interdependencies within the process of partner selection in the fashion and design sector and the emanating criteria for finding the ideal co-branding partner in order to use co-branding as a strategic brand activation tool. Methodology: Multiple Case Study Theoretical perspective: Brand Building and Brand Activation, Relationship Marketing, Strategic Alliances, Affinity Partnering, Co-Branding, Consumer-Brand Relationships Empirical data: Interviews with expert consultants and company representatives (adidas, BMW, BMW MINI, Diesel, H&M, Opel, Philips, Sharp, Volkswagen) Conclusion: Partner selection depends decisively on the different co-branding aims and incorporates the crucial step when using co-branding as a tool for strategic brand activation. The co-branding aim and the corresponding partner lead to various types of relationships, which, in this study, are anthropomorphized to connect the world of marketing and branding to real life. Fashion and design brands have proven to be particularly eligible as co-branding partners for brand activation due to their innovative and trend-oriented nature..
How Venture Capitalists can use their Network in order to reduce the Information Asymmetries between themselves and the Venture Management Team
The purpose of this study is to increase the understanding of how venture capitalists can use their network in order to reduce information asymmetries between themselves and the venture management team. A qualitative approach with semi-structured interviews, consisting of open questions, have been used to receive gradate information in order to reach our explorative purpose. Our theoretical framework consists of relevant studies made on the dynamics of networks and the problems that can arise in the complex relationship between a principal and an agent. We have been interviewing two venture capital firms and therepresentatives from two business angel networks. We also made an additional interview with an influential financial actor in order to try to verify our conclusions Our conclusions are that an extensive network can be used by venture capitalists in order to; verify ventures? technologies, complement the competences in the venture management team, and arrange co-investments, resulting in reduced information asymmetries between themselves and the venture management team.
Analys av datakommunikationssäkerhet för VoIP-protokoll
Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..
The Key Success Factors of Grameen Bank - A Case Study of Strategic, Cultural and Structural Aspects
The thesis aims to analyze strategic, cultural and structural aspects of Grameen Bank and its micro-credit project, in order to identify key success factors. A case study was performed with an inductive and qualitative approach, using semi-structured interviews. The data was collected by field observations and interviews on site in Dhaka, Bangladesh and surrounding areas.The main conclusion is that the critical success factor of Grameen Bank is the relationship focus, guiding and aligning its strategy, culture and structure. Also, local offices have been observed to utilize practices not permitted by the bank?s management, ultimately increasing the organizational efficiency..