Sök:

Sökresultat:

79 Uppsatser om Tangible bits - Sida 1 av 6

Den falska nyckeln : Stångbett för skolridning - historia, terminologi, katalogisering

The art of riding is a fugitive art, which signifies that the means available for documentation of performances are insufficient, and that the equipment used by the old masters are important clues for the understanding of their art. The most specialized tool used for riding is the bit, in particular the curb. As museum catalogues become accessible to the public through the internet, riders will look for information about bits. It is then important that the information provided in the catalogues is valid not just for the curator, archaeologist or art historian, but also for the rider.In this paper, I add context to the bits by explaining two opposing philosophies of bitting, and how they affect the design of the bits. This is followed by a brief history of the art of riding and how the bits have evolved since the 16?th century.

Inspirational Bits : Förmedla teknik i en designmiljö

Ialladesignprocessermåstemantahänsyntillettmediumsegenskaper.Dettaäringetnyttinomdesign.Ändåförekommerdetoftainommänniska--?datorinteraction(HCI)ochinteraktivsystemdesignattteknikensegenskaperbarasesöversomhastigast.Teknikenäroftaabstraherad,utanatttillräckliguppmärksamhetgestillhurderasdistinktaegenskaperöppnaruppfördesignmöjligheter.IdenhärrapportenbeskrivsetttillvägagångssättsomkallasInspirationalBitsförattblimerbekantmeddesignmaterialetinomHCI,detdigitalamaterialet.Detärocksåettsättförattblibättrepåattförmedlakunskapentillallagruppmedlemmariettinterdisciplinärtdesignteam.InspirationalBitsskapas?snabbtochsmutsigt?menärfulltfungerandesystemibådehard--?ochmjukvara,medmåletattblottaenellerfleraavdedynamiskaegenskapernahosdigitalamaterial..

Informationssäkerhet och mobila enheter

Mobila enheter såsom bärbara datorer, avancerade handdatorer och mobiltelefonerblir allt vanligare i organisationer. Tidigare har informationssäkerhet byggts upp föratt skydda organisationer från attacker utifrån, men nu måste man även skyddaorganisationen inifrån. Detta för att enheter tas ut ur organisationen och utsätts förandra, möjligt farliga miljöer. För att sedan på nytt föras in i organisationensnätverk. Basnivå för informationssäkerhet, BITS är riktlinjer framtagna avKrisberedskapsmyndigheten.

qbits : Kombinerar användning och förvaring av bits

Aren?t you tired of never finding stuff? Take a bits as example, do you store these lose in your toolbox or carpenter belt? What if you could have it all accessible and assembled in a tool, always at arm?s reach?Today bits are used together with electric screwdrivers and handheld screwdrivers in a greater spread. For these different types of storage, from pure storage boxes to complex tools with storage built in, exist. The professional craftsmen commonly use some kind of box where the bits can be stored. Even so they tend to store their bits loose in a carpenter belt or toolbox, since they want the speed and accessibility of carpenter belt over the storage box?s tidiness.The project was started in the fall of 2010 and a referents group was early put together to ensure that the developed product became as user-friendly and attractive as possible.

En studie av metodbyte vid sintring av hårdmetaller till mikrovågsintring samt dess ekonomiska fördelar : Självständigt arbete i teknisk fysik med materialvetenskap & Självständigt arbete i kemiteknik

The aim with this study was to investigate the effects a change of manufacturing process would have on the mechanical properties of drill bits made of a WC/Co composite used for stone cutting. The method used today is sintering, where the material is heated in a conventional sintering oven. The other method was microwave sintering, where the material is heated by radiation in the microwave region. Also an investigation of the manufacturing cost were made.The main difference between the two heating methods is that the conventional way is a rather slow process and the microwave method is very fast. The material is also heated homogeniously in the method with mirowaves, aposed to the case with the conventional sintering where the material is heated from the outside in.This makes the material harder and more wear resistent.

Hör upp!!

In this Bachelor thesis I explore sound and room as elements in design of user interfaces, both theoretical and practical in a specific application domain, to identify some of the advantages and disadvantage associated with these elements. As application domain I studied email clients and their usage at home amongst students at Blekinge Institute of Technology. In the study I found an activity, which seems to be highly distributed in the physical room where the user is located. The activity was notification of email and could take place in an arbitrary location of the home. I then augmented this activity with ideas from my theoretical assumption about room and sound.

Synligt- och osynligt stöd : Anhörigas upplevelser av stöd när en familjemedlem vårdas i sen palliativ fas.

When a family member is being cared for in palliative care relatives often need support to be able to support their family member. The purpose of the literature review was to illuminate the nursing staff?s support from the relatives? perspective when a family member is being cared in a late palliative phase. The study is a literature review, there already existing research are surveyed. The findings were structured into two parts, tangible- and the intangible support.

Synligt- och osynligt stöd. Anhörigas upplevelser av stöd när en familjemedlem vårdas i sen palliativ fas.

When a family member is being cared for in palliative care relatives often need support to be able to support their family member. The purpose of the literature review was to illuminate the nursing staff?s support from the relatives? perspective when a family member is being cared in a late palliative phase. The study is a literature review, there already existing research are surveyed. The findings were structured into two parts, tangible- and the intangible support.

Hör upp!!

In this Bachelor thesis I explore sound and room as elements in design of user interfaces, both theoretical and practical in a specific application domain, to identify some of the advantages and disadvantage associated with these elements. As application domain I studied email clients and their usage at home amongst students at Blekinge Institute of Technology. In the study I found an activity, which seems to be highly distributed in the physical room where the user is located. The activity was notification of email and could take place in an arbitrary location of the home. I then augmented this activity with ideas from my theoretical assumption about room and sound. The result was a rule-based agent for notification of email, which primarily uses sound as interaction style..

Windows, RedHat och IPv6 : ett test!

With the huge amount of computers connected to the Internet the IP-addresses are starting to run out. The Internet Engineering Task Force, IETF, have decided that it is about time to exchange the old 32 bits Internet protocol, Ipv4, to a more modern 128 bits protocol called Ipv6. This thesis explores the possibility to install Ipv6 in different operating systems. By testing various operating systems and by set up criteria compare them to each other we give the reader a picture of how the installation is done. We also show which operating systems to prefer if you want to use IPv6.

Windows, RedHat och IPv6 - ett test!

With the huge amount of computers connected to the Internet the IP-addresses are starting to run out. The Internet Engineering Task Force, IETF, have decided that it is about time to exchange the old 32 bits Internet protocol, Ipv4, to a more modern 128 bits protocol called Ipv6. This thesis explores the possibility to install Ipv6 in different operating systems. By testing various operating systems and by set up criteria compare them to each other we give the reader a picture of how the installation is done. We also show which operating systems to prefer if you want to use IPv6.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

En jämförelse av krypteringsalgoritmer

Today the Internet is used more and more as a transportation for information. Much of the information is confidential and should not be read by those not privileged. To protect the information from unauthorized access cryptography can be applied. The cryptography algorithms in use today all have their pros and cons. They are therefore suited for different applications.

Ipv6 : En empirisk studie i hur Ipv6 protokollet har utvecklats de senaste åren.

Internet grows, so it?s cracking, soon will all IPv4 addresses be allocated and a solution is urgently needed. The new protocol, IPv6 is the solution to this problem. With a size of 128 bits against IPv4s 32 bits gives IPv6 a huge amount of addresses to distribute. The security addition that may be added manually in IPv4 is the standard with the new protocol.

Säkerhetsanalys av Olofströms kommuns IT-verksamhet : En utvärdering av informationssäkerhet

Uppsatsen syftar till att utvärdera informationssäkerheten i Olofströms kommuns IT-verksamhet för att jämföra resultatet med BITS. Vidare syfte med uppsatsen är att se över de övriga Blekingska kommunernas syn på informationssäkerhet samt hur de arbetar med det. Uppsatsen klarlägger även Olofströms kommuns anställdas syn på informationssäkerhet samt ger en sammanfattning hur deras dator-, lösenords- och e-posthantering ser ut. En tillsyn av Olofströms kommuns dokument "Säkerhetsinstruktion IT, för användare" genomförs för att utvärdera huruvida dokumentet uppnår en acceptabel säkerhetsnivå för informationshantering.Sammanfattningsvis visar resultaten att Olofströms kommun genomför ett aktivt arbete med informationssäkerhet. Resultaten visar även att de övriga Blekingska kommunerna anser att informationssäkerhet är viktigt och de jobbar någorlunda likvärdigt med det.

1 Nästa sida ->