Dissertations / Theses on the topic 'Network configuration management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Network configuration management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Siu, Joao Baptista. "Network configuration management systems." Thesis, University of Macau, 2001. http://umaclib3.umac.mo/record=b1447841.
Full textLi, Yanrong. "Network configuration management in heterogeneous ATM environments." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0022/MQ27019.pdf.
Full textMartin, Todd. "Network configuration and change management software selection for Company XYZ." Menomonie, WI : University of Wisconsin--Stout, 2006. http://www.uwstout.edu/lib/thesis/2006/2006martint.pdf.
Full textDoshi, Abhay. "Fault/configuration management for wireless ad-hoc network." FIU Digital Commons, 2002. http://digitalcommons.fiu.edu/etd/3081.
Full textSipahutar, Halomoan. "Web-based network management configuration for the Indonesian Eastern Fleet Wide Area Network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA390446.
Full textThesis advisors, John Osmundson, Rex Buddenberg. Includes bibliographical references (p. 183-184). Also available online.
Brewer, Mack L. "Implementation of a configuration management system for a local area network." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28274.
Full textSimard, François. "A packet radio network design for field, mobile multimedia communications, network configuration, radio channel access and network management." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ28459.pdf.
Full textRaza, Syed Kamran. "A plug-and-play approach with distributed computing alternatives for network configuration management." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0003/MQ43346.pdf.
Full textRaza, Syed Kamran Carleton University Dissertation Engineering Systems and Computer. "A Plug-and-play approach with distributed computing alternatives for network configuration management." Ottawa, 1999.
Find full textVan, Graan Sebastiaan Jan. "Network configuration improvement and design aid using artificial intelligence." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-08292008-170524/.
Full textRezk, Rasha Saber Mahmoud. "Exploring the constraining influence of product attributes on value network configuration and dispersion." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708854.
Full textLiu, Yang. "Exploring the interrelationship between supply network configuration, capabilities and green supply chain management strategies." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708635.
Full textHara, Yoritoshi [Verfasser]. "Inter-Firm Relationship Management : Activity Coordination, Resource Configuration, Trust Building, and Network Orchestration / Yoritoshi Hara." Berlin : Freie Universität Berlin, 2020. http://d-nb.info/121950839X/34.
Full textHomer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.
Full textDaley, Marcia. "Exploring the Relationship between Supply Network Configuration, Interorganizational Information Sharing and Performance." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/managerialsci_diss/16.
Full textMartínez, Anny. "An ontology-based approach toward the configuration of heterogeneous network devices." Doctoral thesis, Universitat Politècnica de Catalunya, 2015. http://hdl.handle.net/10803/299803.
Full textA pesar de los numerosos esfuerzos de estandarización, los problemas de semántica continúan en efecto en muchas subáreas de networking. La inabilidad de intercambiar data sin ambiguedad entre sistemas es un problema que limita la interoperabilidad semántica. En esta tesis, abordamos los problemas de semántica en dos áreas: (i) la gestión de configuración y (ii) arquitecturas de direccionamiento. El hecho que hace el estudio en estas áreas de interés, es que los problemas de semántica datan desde los inicios del Internet. Sin embargo, mientras las redes continúan creciendo en tamaño y complejidad, los mecanismos desplegados dejan de ser escalabales y prácticos. Una de las tareas más complejas y esenciales en la gestión de redes es la configuración de equipos. La falta de mecanismos estándar para la modificación y control de la configuración de equipos ha llevado al uso continuado y extendido de interfaces por líneas de comando (CLI). Desafortunadamente, las CLIs son generalmente, específicos por fabricante y dispositivo. En el contexto de redes heterogéneas--es decir, redes típicamente compuestas por múltiples dispositivos de distintos fabricantes--el uso de varias CLIs trae consigo serios problemas de operación, administración y gestión. En consecuencia, los administradores de red se ven forzados a adquirir experiencia en el manejo específico de múltiples tecnologías y además, a mantenerse continuamente actualizados en la medida en que nuevas funcionalidades o tecnologías emergen, o bien con actualizaciones de sistemas operativos. En general, la utilización de mecanismos propietarios no permite compartir conocimientos de forma consistente a lo largo de plataformas heterogéneas, ni reutilizar configuraciones con el objetivo de alcanzar la completa automatización de tareas de configuración--que son típicamente requeridas en el área de gestión autonómica. Debido a esta heterogeneidad, las CLIs suelen proporcionar una función de ayuda que fundamentalmente aporta información para la interpretación semántica del entorno de configuración de un fabricante. La gran cantidad de información que un administrador debe aprender y manejar, hace de la extracción de información y otras formas de análisis de lenguaje natural del campo de Inteligencia Artificial, potenciales herramientas para la configuración de equipos en entornos heterogéneos. Esta tesis presenta el diseño y especificaciones de implementación del primer sistema de extracción de información basada en ontologías desde el CLI de dispositivos de red, para la automatización y abstracción de configuraciones. Por otra parte, la denominada sobrecarga semántica de direcciones IP--en donde, las direcciones son identificadores y localizadores al mismo tiempo--es una de las principales limitaciones sobre mobilidad, multi-homing y escalabilidad del sistema de enrutamiento. Por esta razón, numerosas propuestas han emergido en un esfuerzo por desacoplar la semántica del esquema de direccionamiento de las redes actuales. En esta tesis, abordamos este problema desde dos perspectivas, la primera de ellas una aproximación no-disruptiva (es decir, evolucionaria) al problema del Internet actual y la segunda, una nueva propuesta en torno a futuras arquitecturas del Internet. En el primer escenario, analizamos el protocolo LISP (del inglés, Locator/Identifier Separation Protocol) ya que es en efecto, una de las soluciones con mayor potencial para la resolucion del problema de semántica. Sin embargo, su adopción está limitada por problemas en los sistemas de mapeo propuestos. En esta tesis, proponemos LRP (del inglés, LISP Redundancy Protocol) un protocolo destinado a complementar LISP e incrementar la factibilidad de despliegue, a la vez que, reduce el tamaño de las tablas de mapeo, tiempo de latencia y maximiza accesibilidad. En el segundo escenario, exploramos TARIFA una arquitectura de red de nueva generación e introducimos un novedoso esquema de direccionamiento orientado a servicios.
Lohmüller, Simon [Verfasser], and Bernhard [Akademischer Betreuer] Bauer. "Cognitive Self-Organizing Network Management for Automated Configuration of Self-Optimization SON Functions / Simon Lohmüller ; Betreuer: Bernhard Bauer." Augsburg : Universität Augsburg, 2019. http://d-nb.info/119169321X/34.
Full textWong, Alfred Ka Yiu Computer Science & Engineering Faculty of Engineering UNSW. "Ontology mapping: a logic-based approach with applications in selected domains." Publisher:University of New South Wales. Computer Science & Engineering, 2008. http://handle.unsw.edu.au/1959.4/41103.
Full textZhu, Yong. "Routing, Resource Allocation and Network Design for Overlay Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14017.
Full textSuriano, Douglas A. "The design of a Local Area Network Configuration Management System for the Naval Postgraduate School Administrative Sciences Department." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25828.
Full textAkkoc, Hasan. "A pro-active routing protocol for configuration of signaling channels in Server and Agent-based Active network Management (SAAM)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA379811.
Full textKalim, Umar. "Cognizant Networks: A Model and Framework for Session-based Communications and Adaptive Networking." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/87387.
Full textPHD
Jonsson, Robin, and Simon Blixt. "Distribution and configuration of agents for NMS in a reasonable time." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-29518.
Full textAlves, Rodrigo Sanger. "Operações atômicas para gerenciamento baseado em políticas." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/11304.
Full textThis work presents an investigation of the viability of performing atomic operations during the configuration of multiple devices in a computer network. Specially, the configuration of devices using policy-based network management is addressed. In these cases, the need of atomic operations comes from the fact that a policy application that fails in a certain device can lead to an inconsistent state in a network from which an uniform and global behavior is desired. Thus, this work analyses requirements, limitations, implications, and alternatives for obtaining atomicity in policy deployment. As a solution for this problem, this work defines a consensus protocol to be used by the participants in the policy deployment process. Such protocol was implemented using Web Services and integrated to a policy-based network management system named QAME. At last, the proposed solution is evaluated through a set of tests performed over a testing scenario composed of a high-performance cluster.
Lisbôa, Cléo Pagno. "Caracterização de novas interfaces de telecom a partir de interfaces e dispositivos gerenciáveis." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/14782.
Full textWith the development of telecommunications networks and the different types of netwok components, the task of supporting new technologies in network management systems became too complicated, due to the fact that every interface and every network element has different atributes, characteristics and configurations. This work will identify similarities between devices and interfaces used by telecom providers in Brasil with the intention of facilitating the support of new technologies in network management systems. This research will be done on companies that develop this devices forming a basic set of objects to support new technologies. In order to find this similarities, we developed the Device Compare which is a tool that access a database of network management system, and compare two interfaces showing the similarities among the monitored objects, presenting the type of the object, i.e. it shows if the object is monitored to derive status or if it has to be configured, showing the communication protocol used to retrieve the information. From the result of this study on telecom interfaces used in Brasil and the comparation of objects monitored by the management system made by Device Compare tool we implemented a list with the most common objects in telecom interfaces. This list will be used to facilitate the support of new interfaces in management systems, and through the knowledge of old interfaces management, create the support to new interfaces and new devices that appear in the telecommunication market.
Samuelsson, Peter. "Management of technology in the process industries: Matching market and machine." Doctoral thesis, KTH, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199705.
Full textQC 20170116
Habib, Farooq. "Interplay between network configurations and network governance mechanisms in supply networks a systematic literature review." Thesis, Cranfield University, 2012. http://dspace.lib.cranfield.ac.uk/handle/1826/7879.
Full textKim, Min Young. "Configuration and management of wireless sensor networks. /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FKim%5FMin.pdf.
Full textThesis Advisor(s): Gurminder Singh, Arijit Das. Includes bibliographical references (p. 127-129). Also available online.
Kim, Min Y. "Configuration and management of wireless sensor networks." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1763.
Full textSardara, Mauro. "Towards a scalable and programmable incremental deployment of ICN in the real world." Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLT042.
Full textInformation-Centric Networking (ICN) embraces a family of network architectures rethinking Internet communication principles around named-data. After several years of research and the emergence of a few popular proposals, the idea to replace TCP/IP with data-centric networking remains a subject of debate. ICN advantages have been advocated in the context of 5G networks for the support of highly mobile, multi-access/source and latency minimal patterns of communications. However, large-scale testing and insertion in operational networks are yet to happen, likely due to the lack of a clear incremental deployment strategy. The aim of this thesis is to propose and evaluate effective solutions for deploying ICN. Firstly, we propose Hybrid-ICN (hICN), an ICN integration inside IP (rather that over/ under/ in place of) that has the ambition to trade-off no ICN architectural principles. By reusing existing packet formats, hICN brings innovation inside the IP stack, requiring minimal software upgrades and guaranteeing transparent interconnection with existing IP networks. Secondly, the thesis focuses on the problem of deploying ICN at the network endpoints, namely at the end host, by designing a transport framework and a socket API that can be used in several ICN architectures such as NDN, CCN and hICN. The framework fosters cutting-edge technologies aiming at providing performance and efficiency to applications. An extensive benchmarking at the end of the chapter will present the performance of the transport framework. Subsequently, the benefits that hICN network and transport services can bring to applications will be assessed, by considering two main use cases: HTTP and WebRTC. The former represents the de-facto protocol of the Web, while the latter is a new emerging technology increasingly adopted for real time services. At last, the thesis proposes a solution for programmatically deploying, configuring and managing ICN networks and applications: Virtualized ICN (vICN), a programmable unified framework for network configuration and management that uses recent progresses in resource isolation and virtualization techniques. It offers a single, flexible and scalable platform to serve different purposes, in particular the real deployments of ICN in existing IP networks
Atoui, Wassim Sellil. "Toward auto-configuration in software networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS015.
Full textSoftware networks have the potential to take the network infrastructure to a more advanced level, a level that can make the configuration autonomic. This ability can overcome the rapidly growing complexity of current networks, and allow management entities to enable an effective behavior in the network for overall performance improvement without any human intervention. Configuration parameters can be automatically selected for network resources to cope with various situations that networks encounter like errors and performance degradation. Unfortunately, some challenges need to be tackled to reach that advanced level of networks. Currently, the configuration is still often generated manually by domain experts in huge semi-structured files written in XML, JSON, and YAML. This is a complex, error-prone, and tedious task to do by humans. Also, there is no formal strategy except experience and best practices of domain experts to design the configuration files. Different experts may choose different configurations for the same performance goal. This situation makes it harder to extract features from the configuration files and learn models that could generate or recommend automatic configuration. Moreover, there is still no consensus on a common configuration data model in software networks, which resulted in heterogeneous solutions, such as TOSCA, YANG, Hot, etc. that make the end-to-end network management difficult. In this thesis, we present our contributions that tackle the aforementioned challenges related to automating the configuration in software networks. To tack the problem of heterogeneity between the configuration files we propose a semantic framework based ontologies that can federate common elements from different configuration files. And, to tackle the problem of generating automatically the configuration, we propose two contributions, one contribution that considers deep neural networks to learn from configuration files models for recommending the configuration and another contribution based on a model-driven approach to assist automatically the design of the configuration files
Kudláček, Marek. "Systém pro správu a monitoring PC." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316966.
Full textEl, Kaed Charbel. "Home Devices Mediation using ontology alignment and code generation techniques." Thesis, Grenoble, 2012. http://www.theses.fr/2012GRENM002/document.
Full textUbiquitous systems imagined by Mark Weiser are emerging thanks to the development of embedded systems and plug-n-play protocols like the Universal Plug aNd Play (UPnP), the Intelligent Grouping and Resource Sharing (IGRS), the Device Pro le for Web Services (DPWS) and Apple Bonjour. Such protocols follow the service oriented architecture (SOA) paradigm and allow an automatic device and service discovery in a home network. Once devices are connected to the local network, applications deployed for example on a smart phone, a PC or a home gateway, discover the plug-n-play devices and act as control points. The aim of such applications is to orchestrate the interactions between the devices such as lights, TVs and printers, and their corresponding hosted services to accomplish a specific human daily task like printing a document or dimming a light. Devices supporting a plug-n-play protocol announce their hosted services each in its own description format and data content. Even similar devices supporting the same services represent their capabilities in a different representation format and content. Such heterogeneity along with the protocols layers diversity, prevent applications to use any available equivalent device on the network to accomplish a specific task. For instance, a UPnP printing application cannot interacts with an available DPWS printer on the network to print a document. Designing applications to support multiple protocols is time consuming since developers must implement the interaction with each device pro le and its own data description. Additionally, the deployed application must use multiple protocols stacks to interact with the device. More over, application vendors and telecoms operators need to orchestrate devices through a common application layer, independently from the protocol layers and the device description. To accomplish interoperability between plug-n-play devices and applications, we propose a generic approach which consists in automatically generating proxies based on an ontology alignment. The alignment contains the correspondences between two equivalent devices descriptions. Such correspondences actually represent the proxy behaviour which is used to provide interoperability between an application and a plug and play device. For instance, the generated proxy will announce itself on the network as a UPnP standard printer and will control the DPWS printer. Consequently, the UPnP printing application will interact transparently with the generated proxy which adapts and transfers the invocations to the real DPWS printer. We implemented a prototype as a proof of concept that we evaluated on several real UPnP and DPWS equivalent devices
Chen, Huoping. "Self-Configuration Framework for Networked Systems and Applications." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/195456.
Full textEl, kaed Charbel. "La médiation d'interaction entre les équipements domestiques basés sur l'alignement d'ontologies et la génération du code." Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00680022.
Full textLacerda, Fabrizzio Cabral de. "Uma proposta de arquitetura para o protocolo NETCONF sobre SOAP." [s.n.], 2007. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259627.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-10T08:14:26Z (GMT). No. of bitstreams: 1 Lacerda_FabrizzioCabralde_M.pdf: 1883686 bytes, checksum: c6ae7f1ec9d40594dd97e011ec07e59b (MD5) Previous issue date: 2007
Resumo: A gerência de redes é formada por cinco áreas funcionais: Falha, Configuração, Contabilidade, Desempenho e Segurança. A área de configuração é responsável pela operação e manutenção da rede, acompanhando as mudanças de configuração realizadas em cada dispositivo da rede. As principais ferramentas de gerência disponíveis, CLI e SNMP, não atendem aos requisitos de configurações das redes atuais. Novas tecnologias Web estão se tornando comuns na gerência de redes, com destaque para o uso da linguagem XML e do protocolo HTTP. Com o objetivo de aplicar estas novas tecnologias na configuração de redes foi definido, no âmbito do IETF, um novo protocolo de gerência de configuração denominado NETCONF. Este trabalho faz um estudo do protocolo NETCONF procurando destacar as suas vantagens e limitações. Este trabalho propõe, também, uma arquitetura de implementação para o NETCONF baseada no protocolo de transporte SOAP sobre HTTP, ou sobre HTTPs. Com o objetivo de validar a arquitetura, apresentamos a implementação de um protótipo totalmente aderente à proposta NETCONF para o qual foi especificado um modelo de dados para configuração de VLANs de switches de fabricantes diferentes
Abstract: Network management is formed by five functional areas: Failure, Configuration, Accounting, Performance and Security. The configuration area is responsible for the network¿s operation and maintenance, following the configuration changes done in each network¿s device. The main management tools available, CLI and SNMP, do not take care of the configuration requirements of current networks. New Web technologies are becoming widespread in network management, with prominence of XML language and HTTP protocol. A new protocol of configuration management named NETCONF has been defined, in the scope of the IETF, in order to apply these new technologies for configuration of networks. This work studies the NETCONF protocol aiming to highlight its advantages and limitations. This work also proposes an architecture of implementation for the NETCONF based on the transport protocol SOAP over HTTP, or HTTPs. Aiming to validate such architecture, we present the implementation of a prototype fully adherent to the NETCONF proposal, for which it has specified a model of data for configuration of VLANs of switches from different manufacturers
Mestrado
Engenharia de Computação
Mestre em Engenharia Elétrica
Barrère, Cambrún Martín. "Vulnerability management for safe configurations in autonomic networks and systems." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0048/document.
Full textOver the last years, the massive deployment of computing devices over disparate interconnected infrastructures has dramatically increased the complexity of network management. Autonomic computing has emerged as a novel paradigm to cope with this challenging reality. By specifying high-level objectives, autonomic computing aims at delegating management activities to the networks themselves. However, when changes are performed by administrators and self-governed entities, vulnerable configurations may be unknowingly introduced. Nowadays, vulnerabilities constitute the main entry point for security attacks. Therefore, vulnerability management mechanisms are vital to ensure safe configurations, and with them, the survivability of any autonomic environment. This thesis targets the design and development of novel autonomous mechanisms for dealing with vulnerabilities, in order to increase the security of autonomic networks and systems. We first present a comprehensive state of the art in autonomic computing and vulnerability management. Afterwards, we present our contributions which include autonomic assessment strategies for device-based vulnerabilities and extensions in several dimensions, namely, distributed vulnerabilities (spatial), past hidden vulnerable states (temporal), and mobile security assessment (technological). In addition, we present vulnerability remediation approaches able to autonomously bring networks and systems into secure states. The scientific approaches presented in this thesis have been largely validated by an extensive set of experiments which are also discussed in this manuscript
Abdeljaouad, Imad. "Self-Configuration and Monitoring of Service Specific Overlay Networks." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23960.
Full textCano, Reyes José. "Integrated Architecture for Configuration and Service Management in MANET Environments." Doctoral thesis, Universitat Politècnica de València, 2012. http://hdl.handle.net/10251/14675.
Full textCano Reyes, J. (2012). Integrated Architecture for Configuration and Service Management in MANET Environments [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/14675
Palancia
Dickison, David G. "Implementation of a configuration and maintenance management system for Local Area Networks." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23698.
Full textParthasarathy, Rashmi. "Robust dynamic reprogramming of wireless sensor networks." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Fall2009/r_parthasarathy_112309.pdf.
Full textTitle from PDF title page (viewed on Jan. 20, 2010). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 60-64).
Barman, Dhiman. "Challenges in security and traffic management in enterprise networks /." Diss., [Riverside, Calif.] : University of California, Riverside, 2008. http://proquest.umi.com/pqdweb?index=0&did=1663077951&SrchMode=2&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1265217163&clientId=48051.
Full textIncludes abstract. Title from first page of PDF file (viewed February 3, 2010). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 122-129). Also issued in print.
Hughes, Grant Douglas. "A framework for software patch management in a multi-vendor environment." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2478.
Full textSoftware often requires patches to be installed post-implementation for a variety of reasons. Organisations and individuals, however, do not always promptly install these patches as and when they are released. This study investigated the reasons for the delay or hesitation, identified the challenges, and proposed a model that could assist organisations in overcoming the identified challenges. The research investigated the extent to which the integration of software patch management and enterprise data security is an important management responsibility, by reviewing relevant documents and interviewing key role players currently involved in the patch management process. The current challenges and complexities involved in patch management at an enterprise level could place organisations at risk by compromising their enterprise-data security. This research primarily sought to identify the challenges causing the management of software patches to be complex, and further attempted to establish how organisations currently implement patch management. The aim of the study was to explore the complexities of software patch management in order to enhance enterprise data security within organisations. A single case study was used, and data were obtained from primary sources and literature. The study considered both technological and human factors, and found that both factors play an equally important role with regard to the successful implementation of a patch management program within an organisation.
Behrens, Roger. "Matching networks to needs : travel needs and the configuration and management of local movement networks in South African cities." Doctoral thesis, Faculty of Engineering and the Built Environment, 2002. http://hdl.handle.net/11427/30500.
Full textDiaz, Garcia J. Adrian. "Network analysis of technical and organizational configurations : using an alignment approach to enhance product development performance." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/47856.
Full textIncludes bibliographical references (p. 203-212).
In an attempt to improve their Product Development Processes (PDPs), many companies make considerable investments to have available cutting-edge technology such as virtual tools. While some companies have increased their productivity and time to market with them, some others have not. There seem to be fundamental factors above and beyond the use of these tools that can obstruct the PDP and one of them appears to be the misalignment between the product architecture and the organizational interactions of the actors working on it. While there has been significant work addressing the technical and social concerns of a PDP independently, the nature of the misalignment requires an integrated analysis of the product architecture and the organization. The present work studies them in an integrated approach by making use of network analyses. The research for this thesis was conducted in a Global Product Development (GPD) project of an automotive manufacturer. By first using as a reference the Multidisciplinary System Design Optimization (MSDO) to decompose the architecture of a product and then, using a specific type of Design Structure Matrix (DSM) [43] called N2 Diagram to identify the interfaces of the architecture, a network called theoretical sociogram was created. In addition, the relative sensitivity of some objectives describing the functioning of the product's systems was calculated to classify the strength of the ties in two levels: strong for those above an absolute relative sensitivity of 0.5, and weak for those with an absolute relative sensitivity lower or equal than 0.5.
(cont.) Furthermore, through surveys and interviews, the organizational interactions for two different phases of the project were mapped to construct a new set of networks called actual sociograms. By comparing the sociograms and utilizing metrics that deal with the centrality of the actors in the network, the misalignments were identified. The misalignments provided guidance to identify the enablers and obstacles influencing the PDP. It was observed that, in some cases, when the sensitivity among variables was weak, engineering teams tend to use intermediaries to share information. In some other circumstances the direct interaction doesn't occur, due to reasons including cultural aspects, complexity of the information, the way the information is structured and organizational fuzziness, among others. Based on these findings, some recommendations based on literature review, lessons learned from other industries and conversations with Product Development (PD) actors, are provided.
by J. Adrian Diaz Garcia.
S.M.
Kelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.
Full textPublic key infrastructure (PKI) was created to provide the basic services of confidentiality, authenticity, integrity and non-repudiation for sensitive information that may traverse public (un-trusted) networks. This thesis provides a brief description of the background and functional components of a PKI, and then "builds" a PKI to be used for research at the Naval Postgraduate School (NPS). Deficiencies of this PKI with respect to DoD PKI policy are delineated. The thesis addresses details of software selection, installation, configuration and operation; using Netscape's Certificate Management System as its Certificate Authority application of choice. The functionality of this PKI was validated by testing all major certificate lifecycle events (creation, archival, revocation, validation, etc.) All but two of these tests were successful-key escrow and revocation checking-and thus these two remain to be addressed by further work to make the NPS PKI fully functional.
First Lieutenant, United States Air Force
Lieutenant Commander, United States Navy
Diekmann, Cornelius Hermann [Verfasser], Georg [Akademischer Betreuer] [Gutachter] Carle, and Steven M. [Gutachter] Bellovin. "Provably Secure Networks: Methodology and Toolset for Configuration Management / Cornelius Hermann Diekmann ; Gutachter: Georg Carle, Steven M. Bellovin ; Betreuer: Georg Carle." München : Universitätsbibliothek der TU München, 2017. http://d-nb.info/1139119230/34.
Full textEgan, Melissa K. "An implementation of remote application support in a multilevel environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FEgan.pdf.
Full textThesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. "March 2006." Includes bibliographical references (p. 123-124). Also available online.
Nam, Kyungdoo T. "A Heuristic Procedure for Specifying Parameters in Neural Network Models for Shewhart X-bar Control Chart Applications." Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc278815/.
Full textTröger, Ralph. "Supply Chain Event Management – Bedarf, Systemarchitektur und Nutzen aus Perspektive fokaler Unternehmen der Modeindustrie." Doctoral thesis, Universitätsbibliothek Leipzig, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-155014.
Full text