Buscar
Mostrando ítems 1-10 de 515
Implementación en Java de framework del estándar de hardware y software
(Instituto Politécnico Nacional. Centro de Investigación en Computación, 2008)
En este documento se presentan el desarrollo e implementación completos del framework y su extensión de acuerdo a lo estipulado en el Estándar de Hardware y Software, para el Control Modular de Prototipos Industriales[2] ...
Monitoramento proativo do ambiente de rede utilizando o software Zabbix
(Universidade Tecnológica Federal do ParanáPonta GrossaBrasilDepartamento Acadêmico de InformáticaTecnologia em Análise e Desenvolvimento de SistemasUTFPR, 2016-05-18)
This work aims to demonstrate the solution for proactive monitoring of the network environment using the Zabbix tool. The network structure consists of one Main Management Server , where will be installed Zabbix Server and ...
Arquitetura cliente-servidor em jogos multiplayer
(Universidade Tecnológica Federal do ParanáPonta GrossaBrasilDepartamento Acadêmico de InformáticaTecnologia em Análise e Desenvolvimento de SistemasUTFPR, 2011-11-09)
Game developing involves several areas of knowledge. A multiplayer game allows users to interact in the same environment, seeing the actions executed on remote computers controlled by other players, who can be located in ...
Roteador Linux utilizado como gateway de backup para lata disponibilidade
(Universidade Tecnológica Federal do ParanáCuritibaBrasilEspecialização em Gerenciamento de Redes e ServidoresUTFPR, 2017-11-27)
This project intends to simulate a high availability system between two routers, the main link being through a Cisco router and the backup link through a computer with Linux operating system Ubuntu 17.04, loaded with the ...
Alocação de máquinas virtuais em ambientes de computação em nuvem considerando o compartilhamento de memória
(Universidade Tecnológica Federal do ParanáCuritibaPrograma de Pós-Graduação em Computação Aplicada, 2014-08-29)
Virtualization is a key technology for cloud computing, it provides computational resources as virtual machines for consumption of computing services. In cloud computing environments it is important to keep under control ...
SAFEFW: controle de conexões remotas
(Universidade Tecnológica Federal do ParanáCuritibaDepartamento Acadêmico de Elétrica e Informática Industrial, 2011-08-16)
The remote access protocols are used to enable a user to access a machine remotely. The most common protocols are SSH, RDP, RFB and Telnet. These protocols provide greater flexibility for users, allowing quick access to ...
Deciphering event logs in SharePoint Server: A methodology based on process mining
(IEEE, 2014)
Nowadays, the information systems are an indispensable resource for the organizations. The processes that are managed through these systems most of the time are hard to understand, maintain and improve. The data associated ...
AVAILABILITY EVALUATION OF NETWORKS: AN APPROACH FOR N-TIER CLIENT SERVER ARCHITECTURE
(Universidad de TarapacáFacultad de Ingeniería, 2003)
A medical information system to manage a cancer database
(2008-12-01)
Cancer is the second main cause of death in Brazil, and according to statistics disclosed by INCA - National Cancer Institute 466,730 new cases of the disease are forecast for 2008. The storage and analysis of tumour tissues ...
A medical information system to manage a cancer database
(2008-12-01)
Cancer is the second main cause of death in Brazil, and according to statistics disclosed by INCA - National Cancer Institute 466,730 new cases of the disease are forecast for 2008. The storage and analysis of tumour tissues ...