搜索条件
每页显示结果数
搜索结果
-
- Type:
- Student Work
- 摘抄:
- Business communications are becoming more and more demanding as technology continues to advance in our ever-changing world. VOIP communications allow a business to stay connected with a reliable and flexible method of handling their telecommunication needs. However, VOIP must have optimal networking conditions for it to work properly and reliably. We created a solution to allow businesses to stay connected while minimizing any impacts they may have on their everyday communications. Using Dynamic routing we were able to shift network traffic from overloaded VOIP servers in order to keep communications up and running. According to PriceItHere.com VOIP Solutions can cost $20 to $40 per month per user, which can add up fast. We were able to keep costs low by using open-source software. The result is a quick and reliable VOIP solution that can handle large amounts of traffic and keeps client costs low.
- 作者:
- Hahn, Logan; Tierney, Brett, and Baldrick, Randy
- 提交者:
- CECH Library Service
- 上传日期:
- 06/30/2020
- 创建:
- 2020-04
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- 摘抄:
- In 2017, US motorists spent an average of 17 hours a year attempting to find parking after reaching their destination. In wasted time, fuel, and emissions this costed an estimated $345 per driver over the course of the year.1 The amount of time spent looking for parking is expected to increase as more Americans begin driving. SpotCheck is an end-to-end solution to provide mobile users the ability to quickly and reliably find parking wherever they are. Using machine learning to process images from cameras arrays stationed around local parking lots, our application suite determines where open parking is, so you don’t have to. Our applications allow users to quickly identify and get directions to the closest open parking spaces without the hassle. Parking lot information can be easily managed using our admin web application, allowing parking lot owners to easily make changes that are immediately available to SpotCheck users.
- 作者:
- Bruce, Bradley; Watson, Will, and Bunker, Ryan
- 提交者:
- CECH Library Service
- 上传日期:
- 06/30/2020
- 创建:
- 2020-04
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- 摘抄:
- eZsell is an online marketplace for buying and selling surplus technology. According to a study done by Statista, the average lifespan of IT equipment is five years, and the Department of Information Resources in Texas claims that maintaining equipment past this lifecycle can be up to 59% more expensive than maintaining new equipment. eZsell allows companies, universities, and individuals to recoup some of these maintenance costs by providing a quick and convenient way to market their excess technology. Users of this application are able to sell technology that would otherwise be more expensive to maintain, facilitating a market of usable bargain surplus for other interested parties.
- 作者:
- Scheidt, Austin; Blume, Austin, and Cramer, Scott
- 提交者:
- CECH Library Service
- 上传日期:
- 06/30/2020
- 创建:
- 2020-04
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- 摘抄:
- Have you had a chance to visit the 1819 Innovation hub yet? If not, you're probably not familiar with all the exciting opportunities and services the building has to offer. To some, the possibilities at 1819 can be quite overwhelming, but with the 1819 Mobile app, we make these opportunities more approachable. With our location based informational beacons and seamless check-in pre-registration process, you can skip to the front of the line and get right to work on your latest ideas and inventions. Using Apple’s Core Location services, the power of Swift, and the latest in Bluetooth low energy beacon technology, the 1819 Mobile app provides you with up to date contextual information about key locations within the University of Cincinnati’s 1819 Innovation Hub. The 1819 Mobile app ensures that you have access to the tools and information needed to succeed in your visit.
- 作者:
- DeMoss, Cameron; Library Service, CECH; Holschuh, Crhis, and Burns, Aidan
- 提交者:
- CECH Library Service
- 上传日期:
- 06/30/2020
- 创建:
- 2020-04
- 证书:
- All rights reserved
-
- Type:
- Student Work
- 摘抄:
- Our web application “Pocket Shelves” ensures small business owners save money by simplifying inventory management for our users. According to Small Business Trends, it’s estimated that businesses around the country lose over 300 billion dollars annually due to poor inventory management [1]. Pocket Shelves allows users to document and edit inventory live, as well as track and organize inventory physically with barcodes. Pocket Shelves also features analytics to help the user better manage their inventory financially. Pocket Shelves allows the user to share their information among an established group with easy to use permissions to restrict use. The user-interface of our application was built to work on any browser with the Bootstrap framework. The backbone of Pocket Shelves was written in Python 3, built with the Flask micro-framework, and primarily using PostgreSQL. Proper inventory management has never been easier, thanks to easy to use applications like Pocket Shelves.
- 作者:
- Abell, Zachary; Napper, Alexander, and Jackson, Adam
- 提交者:
- CECH Library Service
- 上传日期:
- 06/22/2020
- 更改日期:
- 07/10/2020
- 创建:
- 2019-04
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- 摘抄:
- In 2018, disruptiveadvertising.com reported that 3.03 billion people are using some sort of social media. The most popular apps provide something for everyone, but very few actively connect video makers with their audience. NQ is an app designed to connect video makers with knowledgeable critics within their niche. Users will no longer need to worry about using the unhelpful thumbs up, thumbs down rating system to determine what viewers think of their work. All viewers comments are monitored by NQ to ensure high quality feedback. Every feature offered in the app will help artists create their best content every time.
- 作者:
- Paige, William; Ghearing, Brandon, and Horn, Argina
- 提交者:
- CECH Library Service
- 上传日期:
- 06/22/2020
- 创建:
- 2019-04
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- 摘抄:
- Ten billion IoT devices will be added to consumer home networks by 2020 (Leuth, 2018), with little regard for security. Users are unaware of what it takes to secure their networks and there are currently no security standards in place to hold manufacturers accountable. HomeKOP raises awareness of security issues amongst users and equips them with the right tools to secure their smart home networks. We conducted a vulnerability assessment of smart home networks, gauged consumer awareness using surveys, and created a set of standards for IoT devices. Based on the set of standards, we developed a risk score calculation system that helps users visualize risk. We then built onto the Mozilla Web of Things Gateway that employs a user-friendly dashboard to monitor these devices as they are added to a network, creates a risk score based on how well these devices meet the HomeKOP standards and walks users through securing their networks. HomeKOP is revolutionizing the world of security by putting the user back in control.
- 作者:
- Padgett, Briana; Oyelowo, Oreofeoluwa, and Kunapareddi, Vineela
- 提交者:
- CECH Library Service
- 上传日期:
- 06/22/2020
- 创建:
- 2019-04
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- 摘抄:
- Phishing Emails are a problem as ubiquitous as email itself. According to Digital Guardian, over 90% of all cyber attacks now start with a phishing message (Guest, 2017). Additionally, with over 12% of targets clicking on any given phishing message (Verizon, 13), and 95% of all attacks on enterprise networks begin as a result of spear phishing, it is critical to not only know who clicks on these links, but also when a link was clicked. While there are many tools trying to prevent the message from ever getting in, only Hypersafe will enable instant visibility and scoping when a message inevitably gets through. This is accomplished by intercepting all inbound messages to a target’s email system, and then scanning messages for spam and malicious content, and then replacing every link contained within the message with a custom link that points to the Hypersafe Link Resolution Service. When a user clicks on a link, they first go through the Link Resolution Service to ensure that the link has not been identified as a phishing or otherwise malicious message. If the link is clean, then the user is seamlessly redirected to their intended target. If the link is malicious, the user is redirected to an education and awareness page, thus hindering the attack. In order to ensure reliable service, Hypersafe is built atop the proven Amazon Web Services Platform to enable best in class availability, scalability, and security. The email processing and link resolution services are serverless, enabling Hypersafe to scale without any administrative burden and also cost very little to operate. Finally, there is a web administration portal that administrators can use to interact with the service to manually flag links, senders, and domains as malicious as well as view statistics on who has clicked on a certain link. By taking the uncertainty of email away from the user, Hypersafe will be an invaluable partner in each customer’s defense toolkit.
- 作者:
- Iacobelli, Tony; Johnson, Peter; Burchette, Anthony, and Library Service, CECH
- 提交者:
- CECH Library Service
- 上传日期:
- 06/22/2020
- 创建:
- 2019-04
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- 摘抄:
- "Today, a public cloud is a top priority for many enterprises. Statistics show cloud infrastructure usage has grown from 29 percent in 2017 to 38 percent in 2018." With a wide variety of options, finding the right cloud solution can be inefficient and costly for companies. This is where Omni-Cloud Solutions helps during their digital transformation journey. Our organization aims to make finding the right solution simple with an easy to use web application-based wizard, which will help organizations choose between IaaS, SaaS, XaaS, PaaS, and different storage options from a variety of cloud service providers. The service we provide will allow the organization to provide specific details about them and receive a tailored cloud solution plan based around important metrics such as cost, storage, and availability. Reducing the amount of research previously devoted to migrating their organization to the cloud solution will save time and money allowing them to focus on their own projects.
- 作者:
- Terle, Paul; Turner, Kevin; Price, Gordon; Library Service, CECH, and Cline, Aaron
- 提交者:
- CECH Library Service
- 上传日期:
- 06/22/2020
- 创建:
- 2019-04
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- 摘抄:
- Passwords are not safe, and create vulnerabilities, yet, we rely heavily on them in nearly everything we do. A good password will exceed 10 characters, use a combination of numbers, upper case, lower case, and special characters. Good practice tells us not to reuse passwords. This is a lot to remember when accessing various tools and accounts in our work and private lives. Can a large company trust that a person is not using the same password when accessing company assets as they are at home? This issue is solved by using a MAGIK STICK as a multifactor authentication device that eliminates the need for employees to remember passwords for a company network. MAGIK STICK solves this conundrum by authenticating users via biometrics and generating a token for accessing applications and devices. This token is based on a TOTP (time based one-time password) algorithm.
- 作者:
- Barr, Sean; Ryan, Kyle, and Library Service, CECH
- 提交者:
- CECH Library Service
- 上传日期:
- 06/22/2020
- 创建:
- 2019-04
- 证书:
- Attribution-NonCommercial-NoDerivs 4.0 International
