1,216 research outputs found

    Managing Inventory: A Study of Databases and Database Management Systems

    Get PDF
    Databases play an important role in the storage and manipulation of data. Databases and database management systems allow for fast and efficient data querying that has recently become increasingly important in most companies and organizations. This paper introduces a few of the different types of database management systems that are in widespread use today. It introduces some important terminology related to databases and database management systems. This paper also briefly discusses web user interfaces, highlighting important user interface design principles. Finally, an inventory management system is implemented for a local stationery store and is integrated with a web application to serve as the front end

    Yabi - yet another business inteligence

    Get PDF
    Mestrado de dupla diplomação com a UTFPR - Universidade Tecnológica Federal do ParanáIn the context of Polytechnical Institute of Bragança during student registration time, the information technology department is found to be frequently interrupted in order to attend inquiries regarding the information stored in their databases. To mitigate this, Yabi was developed. It is a Web application built with Angular Framework for the user interface and Java with Spring for the functionalities. In general it provides a portal in which the institution’s employees can access the information found in its databases without the need to have technical knowledge. The developed application is found to attend most of the elicited requirements to be considered useful and offers a foundation for future improvements.No contexto do Instituto Politécnico de Bragança durante o período de matrículas, o departamento de serviços informáticos é frequentemente interrompido em busca de questionamentos sobre as informações contidas nas bases de dados da instituição. Para amenizar isso, o Yabi foi desenvolvido. Esta é uma aplicação Web construida com uma interface de usuário feita no Framework Angular e uma aplicação remota que implementa as funcionalidades necessárias e é escrita em Java com o framework Spring. De maneira geral ela fornece um portal que possibilita os colaboradoes da instituição a ter acesso as informações contidas nas bases de dados sem que seja necessário o conhecimento técnico. Por fim, considera-se que a aplicação final atende aos requisitos de maneira suficiente para ser considerada útil e ao mesmo tempo fornece uma plataforma para desenvolvimentos futuros

    Identity management in a public IaaS Cloud

    Get PDF
    In this thesis the unique environment that is the public IaaS cloud along with its differences from a traditional data center environment has been considered. The Cloud Security Alliance (CSA), states that “Managing identities and access control for enterprise applications remains one of the greatest challenges facing IT today”. The CSA also points out that “there is a lack of consistent secure methods for extending identity management into the cloud and across the cloud” [1]. This thesis examines this challenge of managing identities in the cloud by developing a list of best practices for implementing identity management in the cloud. These best practices were then tested by simulated misuse cases which were tested in a prototype of the implementation strategy. The results and analysis of the misuse cases show that the implementation of the identity management solution solves the problem of managing identities for the control of the infrastructure in the cloud. However, the analysis also shows that there are still areas where the properly implemented identity management solution fails to mitigate attacks to the infrastructure. These failures in particular are attacks that are sourced from the subscriber environments in the cloud. Finally, the best practices from this thesis also present some consistent methods for extending identity management into the cloud

    Unified messaging control platform

    Get PDF

    2022 April 11 -- University Council Agenda and Minutes

    Get PDF

    Cumulonimbus Computing Concerns: Information Security in Public, Private, and Hybrid Cloud Computing

    Get PDF
    Companies of all sizes operating in all markets are moving toward cloud computing for greater flexibility, efficiency, and cost savings. The decision of how to adopt the cloud is a question of major security concern due to the fact that control is relinquished over certain portions of the IT ecosystem. This thesis presents the position that the main security decision in moving to cloud computing is choosing which type of cloud to employ for each portion of the network – the hybrid cloud approach. Vulnerabilities that exist on a public cloud will be explored, and recommendations on decision factors will be made for which specific types of systems to harbor inside a private cloud. Picking the best location for each system allows risk to be managed and sensitive information to be protected while at the same time providing a cost effective option

    SACSCOC Referral Report 2022

    Get PDF
    SACSCOC Referral Report submitted March 31, 2022
    corecore