Essays about: "conclusion on Student Information System Software"

Showing result 1 - 5 of 19 essays containing the words conclusion on Student Information System Software.

  1. 1. Tenant Separation on a multi-tenant microservice platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Axel Sandqvist; [2023]
    Keywords : multitenancy; multi-tenant; multitenant; cloud; cloud storage; IAM; Access control; Technology and Engineering;

    Abstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE

  2. 2. Purchasing and Digitalization in an era of Turbulence

    University essay from Lunds universitet/Teknisk logistik

    Author : Emil Sarajlic; Vishal Natesan; [2023]
    Keywords : Supplying; digitisation; digitalization; Artificial Intelligence; Turbulence; Delivery performance; Duni Group; Technology and Engineering;

    Abstract : Background: This research delves into the uncertainties and challenges encountered in global supply chain operations, exacerbated by unpredictable events such as the COVID-19 pandemic and the 2021 Suez Canal obstruction. These disruptions can lead to stock-outs, poor capacity utilization, and the need for expensive buffers. READ MORE

  3. 3. "What if someone steals it?" - Hands-on evaluation of the software security work of a networked embedded system

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Adina Borg; Hedda Klintskog; [2022]
    Keywords : Technology and Engineering;

    Abstract : As information technology has grown and evolved, so has the need of securing the information. It is important to evaluate both the security of systems and the methods which are used for the evaluation. One method for finding security vulnerabilities in a system is penetration testing. READ MORE

  4. 4. Simulation of Transformer Inrush Currents and Their Impact on the Grid

    University essay from Lunds universitet/Industriell elektroteknik och automation

    Author : Juan de la Peña Toledo; [2022]
    Keywords : Transformer; Energization; PSS E; PSCAD; Simulation; Magnetizing current; Inrush current; Technology and Engineering;

    Abstract : This MSc Thesis’s main objective is to determine the impact of transformer inrush currents in the grid and develop a tool that helps E.ON Energidistribution AB evaluate transformer sizing. The motivation of E. READ MORE

  5. 5. BIM to BEM: Development of integrated workflow from Archicad to Energy Evaluation

    University essay from Lunds universitet/Avdelningen för Energi och byggnadsdesign; Lunds universitet/Institutionen för arkitektur och byggd miljö

    Author : Mariami Tkeshelashvili; [2021]
    Keywords : Building Information Modelling; Building Energy Modelling; interoperability; performance-based design; early design optimization; BIM; BEM; Technology and Engineering;

    Abstract : Buildings are one of the main contributors to climate change as they consume a significant part of the total energy produced. The reduction of the energy consumption and carbon emissions of the buildings is vitally important for our environment. READ MORE