Essays about: "Hybrid, security"
Showing result 1 - 5 of 79 essays containing the words Hybrid, security.
-
1. Information security and hybrid work : A case study of shifts in perceived information security when working hybridly
University essay from Uppsala universitet/InformationssystemAbstract : Hybrid work is already a big part of many organizations' structure. This phenomenon presents many new ways of how work is performed and carries new challenges with it. Parallel to that, the importance of working IT securely and coping with IT threats is significant in all fields of work. READ MORE
-
2. Low-latency transport protocols inactor systems : Performance evaluation of QUIC in Kompact
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Developers widely use actor frameworks to build highly distributed systems. However, modern actor frameworks are limited in their network implementations, with Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) being the main protocols used for network communication. READ MORE
-
3. Effects of Prolonged Electricity Supply Disruptions on Critical Entities
University essay from Lunds universitet/Riskhantering (CI); Lunds universitet/Avdelningen för Riskhantering och SamhällssäkerhetAbstract : This study investigates Swedish critical entities (CEs) ability to maintain function during up to three months of electricity supply disruptions. It also examines possible improvement measures, and how contextual cases (grey zone, heightened state of alert, war) influence CEs’ ability to maintain function during electricity supply disruptions. READ MORE
-
4. IMPLEMENTING SOLAR POWER SYSTEM AT ELIKIA SCHOOL : Electricity Generation for Education and Community Development in the DRC
University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronikAbstract : This report examines the feasibility and cost of installing an off-grid solar system for Elika School in the village of Lwengo, located in the Democratic Republic of Congo. Congo has one of the lowest electrification rates globally. Only 19% of the population has access to electricity, and almost none in rural areas. READ MORE
-
5. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE