Essays about: "Enterprise Application"

Showing result 16 - 20 of 151 essays containing the words Enterprise Application.

  1. 16. Safe Configurable Multitenant SaaS

    University essay from Linköpings universitet/Programvara och system

    Author : Adam Leijonhufvud; Filip Håkansson; [2020]
    Keywords : multitenant; SaaS; compiling; code;

    Abstract : Cloud computing is a significant step forward in computer science. It enables customers to use applications on devices such as telephones, tablets, and computers over the internet. However, in the case of some applications, moving to the cloud can be challenging. Enterprise Resource Planning (ERP) is one example of such an application. READ MORE

  2. 17. Application of Circular Economy to SME Batik Dyeing and Finishing : Sustainability Vetting of Ciwaringin Batik

    University essay from KTH/Hållbar utveckling, miljövetenskap och teknik

    Author : Maja Harren; [2019]
    Keywords : Batik; Circular Economy; SME; Indonesia;

    Abstract : This study is part of a feasibility study conducted by the Sustainability and Resilience Company (su-re.co), and is identified within this report as the sustainability vetting. READ MORE

  3. 18. Investigating differences in response time and error rate between a monolithic and a microservice based architecture

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gustav Johansson; [2019]
    Keywords : Microservices; Monolith; Software Architecture; System Design; Performance Evaluation; PaaS; Containers;

    Abstract : With great advancements in cloud computing, the microservice architecture has become a promising architectural style for enterprise software. It has been proposed to cope with problems of the traditional monolithic architecture which includes slow release cycles, limited scalability and low developer productivity. READ MORE

  4. 19. Two-factor Authentication and Digital Signing for an Enterprise System utilizing Yubikey

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : David Hilm; David Rahim; [2019]
    Keywords : Digital signature; Security; Two-factor Authentication; Authentication; Cryptography; YubiKey; JavaScript; WebCrypto; Universal Second Factor;

    Abstract : The use of a second factor to increase the security of systems is growing and has continued to do so for a long time. This thesis explores options for implementation to use a YubiKey as an authentication method (OTP) as well as for signing digital transactions through a web browser client. READ MORE

  5. 20. Designing a Smartphone Application for Identification of Network Devices

    University essay from Lunds universitet/Ergonomi och aerosolteknologi

    Author : Ebba Busch; Richard Magnusson; [2019]
    Keywords : network device identification; network device installation; IoT; iOS; iPhone application; interaction design; user experience; usability testing; Bluetooth Low Energy; iBeacon; Technology and Engineering;

    Abstract : Today, an increasing amount of physical devices are obtaining Internet connectivity for more efficient management and device communication. In home environments, users may manage devices by providing them descriptive names such as "living room speaker". For a limited set of devices such a solution is often sufficient. READ MORE