{"response":{"docs":[{"system_create_dtsi":"2020-06-22T20:38:53Z","system_modified_dtsi":"2020-07-10T14:50:45Z","has_model_ssim":["StudentWork"],"id":"vh53wx236","accessControl_ssim":["35072b21-08bf-45e2-96be-98eab68555c3"],"hasRelatedMediaFragment_ssim":["0r9675154"],"hasRelatedImage_ssim":["0r9675154"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Pocket Shelves"],"date_uploaded_dtsi":"2020-06-22T20:38:53Z","date_modified_dtsi":"2020-07-10T14:50:45Z","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Moore, Ryan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Abell, Zachary","Napper, Alexander","Jackson, Adam"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Our web application “Pocket Shelves” ensures small business owners save money by simplifying inventory management for our users. According to Small Business Trends, it’s estimated that businesses around the country lose over 300 billion dollars annually due to poor inventory management [1]. Pocket Shelves allows users to document and edit inventory live, as well as track and organize inventory physically with barcodes. Pocket Shelves also features analytics to help the user better manage their inventory financially. Pocket Shelves allows the user to share their information among an established group with easy to use permissions to restrict use. The user-interface of our application was built to work on any browser with the Bootstrap framework. The backbone of Pocket Shelves was written in Python 3, built with the Flask micro-framework, and primarily using PostgreSQL. Proper inventory management has never been easier, thanks to easy to use applications like Pocket Shelves."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["0r9675154","x633f2584"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["0r9675154","x633f2584"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"POCKET SHELVES","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/vh53wx236"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124962744139776,"timestamp":"2021-04-15T16:34:48.701Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T20:36:45Z","system_modified_dtsi":"2020-07-10T14:53:07Z","has_model_ssim":["StudentWork"],"id":"8g84mn824","accessControl_ssim":["34dc0a17-987b-4ad2-8a54-18125ddc3295"],"hasRelatedMediaFragment_ssim":["xg94hr200"],"hasRelatedImage_ssim":["xg94hr200"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["NQ"],"date_uploaded_dtsi":"2020-06-22T20:36:45Z","date_modified_ssi":"Fri Jul 10 10:53:05 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Paige, William","Ghearing, Brandon","Horn, Argina"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["In 2018, disruptiveadvertising.com reported that 3.03 billion people are using some sort of social media. The most popular apps provide something for everyone, but very few actively connect video makers with their audience. NQ is an app designed to connect video makers with knowledgeable critics within their niche. Users will no longer need to worry about using the unhelpful thumbs up, thumbs down rating system to determine what viewers think of their work. All viewers comments are monitored by NQ to ensure high quality feedback. Every feature offered in the app will help artists create their best content every time."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/xg94hr200?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["z603qz99v","xg94hr200"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["z603qz99v","xg94hr200"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"NQ","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/8g84mn824"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124963667935232,"timestamp":"2021-04-15T16:34:49.582Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T20:31:16Z","system_modified_dtsi":"2020-07-10T14:53:09Z","has_model_ssim":["StudentWork"],"id":"pn89d8012","accessControl_ssim":["3c23df25-3177-4a48-a2b6-54beced13626"],"hasRelatedMediaFragment_ssim":["vh53wx22x"],"hasRelatedImage_ssim":["vh53wx22x"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["HomeKOP"],"date_uploaded_dtsi":"2020-06-22T20:31:16Z","date_modified_ssi":"Fri Jul 10 10:53:08 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Moore, Ryan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Padgett, Briana","Oyelowo, Oreofeoluwa","Kunapareddi, Vineela"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Ten billion IoT devices will be added to consumer home networks by 2020 (Leuth, 2018), with little regard for security. Users are unaware of what it takes to secure their networks and there are currently no security standards in place to hold manufacturers accountable. HomeKOP raises awareness of security issues amongst users and equips them with the right tools to secure their smart home networks. We conducted a vulnerability assessment of smart home networks, gauged consumer awareness using surveys, and created a set of standards for IoT devices. Based on the set of standards, we developed a risk score calculation system that helps users visualize risk. We then built onto the Mozilla Web of Things Gateway that employs a user-friendly dashboard to monitor these devices as they are added to a network, creates a risk score based on how well these devices meet the HomeKOP standards and walks users through securing their networks. HomeKOP is revolutionizing the world of security by putting the user back in control."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/vh53wx22x?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["vx021g47z","vh53wx22x"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["vx021g47z","vh53wx22x"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"HOMEKOP","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/pn89d8012"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124962156937216,"timestamp":"2021-04-15T16:34:48.141Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T20:28:12Z","system_modified_dtsi":"2020-07-10T14:53:10Z","has_model_ssim":["StudentWork"],"id":"73666605j","accessControl_ssim":["e405f0db-3117-49f5-8a87-564418b305e1"],"hasRelatedMediaFragment_ssim":["6t053h17b"],"hasRelatedImage_ssim":["6t053h17b"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Hypesafe"],"date_uploaded_dtsi":"2020-06-22T20:28:12Z","date_modified_ssi":"Fri Jul 10 10:53:09 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Vykhovanyuk, Bogdan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Iacobelli, Tony","Johnson, Peter","Burchette, Anthony","Library Service, CECH"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Phishing Emails are a problem as ubiquitous as email itself. According to Digital Guardian, over 90% of all cyber attacks now start with a phishing message (Guest, 2017). Additionally, with over 12% of targets clicking on any given phishing message (Verizon, 13), and 95% of all attacks on enterprise networks begin as a result of spear phishing, it is critical to not only know who clicks on these links, but also when a link was clicked. While there are many tools trying to prevent the message from ever getting in, only Hypersafe will enable instant visibility and scoping when a message inevitably gets through. This is accomplished by intercepting all inbound messages to a target’s email system, and then scanning messages for spam and malicious content, and then replacing every link contained within the message with a custom link that points to the Hypersafe Link Resolution Service. When a user clicks on a link, they first go through the Link Resolution Service to ensure that the link has not been identified as a phishing or otherwise malicious message. If the link is clean, then the user is seamlessly redirected to their intended target. If the link is malicious, the user is redirected to an education and awareness page, thus hindering the attack. In order to ensure reliable service, Hypersafe is built atop the proven Amazon Web Services Platform to enable best in class availability, scalability, and security. The email processing and link resolution services are serverless, enabling Hypersafe to scale without any administrative burden and also cost very little to operate. Finally, there is a web administration portal that administrators can use to interact with the service to manually flag links, senders, and domains as malicious as well as view statistics on who has clicked on a certain link. By taking the uncertainty of email away from the user, Hypersafe will be an invaluable partner in each customer’s defense toolkit."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/6t053h17b?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["6t053h17b","v692t764m"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["6t053h17b","v692t764m"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"HYPESAFE","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/73666605j"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124959726338048,"timestamp":"2021-04-15T16:34:45.823Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T20:25:53Z","system_modified_dtsi":"2020-07-10T14:53:12Z","has_model_ssim":["StudentWork"],"id":"tm70mw64t","accessControl_ssim":["3bbb8f3f-fbd4-4ee0-ae7f-7e5bd6ba38ab"],"hasRelatedMediaFragment_ssim":["gq67js639"],"hasRelatedImage_ssim":["gq67js639"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Omni Cloud Solutions"],"date_uploaded_dtsi":"2020-06-22T20:25:53Z","date_modified_ssi":"Fri Jul 10 10:53:11 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Moore, Ryan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Terle, Paul","Turner, Kevin","Price, Gordon","Library Service, CECH","Cline, Aaron"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["\"Today, a public cloud is a top priority for many enterprises. Statistics show cloud infrastructure usage has grown from 29 percent in 2017 to 38 percent in 2018.\" With a wide variety of options, finding the right cloud solution can be inefficient and costly for companies. This is where Omni-Cloud Solutions helps during their digital transformation journey. Our organization aims to make finding the right solution simple with an easy to use web application-based wizard, which will help organizations choose between IaaS, SaaS, XaaS, PaaS, and different storage options from a variety of cloud service providers. The service we provide will allow the organization to provide specific details about them and receive a tailored cloud solution plan based around important metrics such as cost, storage, and availability. Reducing the amount of research previously devoted to migrating their organization to the cloud solution will save time and money allowing them to focus on their own projects."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/gq67js639?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["gq67js639","fj2363480"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["gq67js639","fj2363480"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"OMNI CLOUD SOLUTIONS","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/tm70mw64t"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124961008746496,"timestamp":"2021-04-15T16:34:47.046Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T20:20:12Z","system_modified_dtsi":"2020-07-10T14:53:14Z","has_model_ssim":["StudentWork"],"id":"w0892c44n","accessControl_ssim":["5f2cbc59-c14d-4eab-8b80-36fc8e941509"],"hasRelatedMediaFragment_ssim":["z316q289j"],"hasRelatedImage_ssim":["z316q289j"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Project Magic Stick"],"date_uploaded_dtsi":"2020-06-22T20:20:12Z","date_modified_ssi":"Fri Jul 10 10:53:13 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Vykhovanyuk, Bogdan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Barr, Sean","Ryan, Kyle","Library Service, CECH"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Passwords are not safe, and create vulnerabilities, yet, we rely heavily on them in  nearly everything we do. A good password will exceed 10 characters, use a combination of  numbers, upper case, lower case, and special characters. Good practice tells us not to \r\nreuse passwords. This is a lot to remember when accessing various tools and accounts in  our work and private lives. Can a large company trust that a person is not using the same password when accessing company assets as they are at home? This issue is solved by \r\nusing a MAGIK STICK as a multifactor authentication device that eliminates the need for employees to remember passwords for a company network. MAGIK STICK solves this  conundrum by authenticating users via biometrics and generating a token for accessing applications and devices. This token is based on a TOTP (time based one-time password) algorithm."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/z316q289j?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["736666048","z316q289j"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["736666048","z316q289j"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"PROJECT MAGIC STICK","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/w0892c44n"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124963218096128,"timestamp":"2021-04-15T16:34:49.153Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T20:18:05Z","system_modified_dtsi":"2020-07-10T14:53:16Z","has_model_ssim":["StudentWork"],"id":"rf55z901t","accessControl_ssim":["96d6a95d-0da0-43ab-be9a-d5106dc1626c"],"hasRelatedMediaFragment_ssim":["8049g6334"],"hasRelatedImage_ssim":["8049g6334"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["FortifIoT"],"date_uploaded_dtsi":"2020-06-22T20:18:04Z","date_modified_ssi":"Fri Jul 10 10:53:15 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Hopperton, Tyler"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Schroeder, Michael","Library Service, CECH","Manahan, Stephan","Lyons, Christopher"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Gartner reports that there will be around 20.8 billion [IoT devices] by 2020. Among these devices are countless vulnerabilities and security concerns. As of now, there is no single device that remediates those vulnerabilities or even detects them. The Mirai botnet incident took countless websites offline and affected millions of people. What if there was a device that could have detected this sort of activity? Our product would have thwarted an attack of this type via network monitoring of each IoT device on a user’s home network. Our product would function as a plug and play device and would be able to detect abnormal IoT network activity. The objective is to ensure the devices are only operating based on necessity. This gives the owners peace of mind that their IoT devices are functioning normally. The number of IoT devices is going to surpass the number of mobile phones and computers in the coming years. This will require the need for additional security measures similar to that of antivirus. Our product is a step in the right direction for securing these devices"],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/8049g6334?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["8049g6334","w9505206z"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["8049g6334","w9505206z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"FORTIFIOT","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/rf55z901t"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124961545617408,"timestamp":"2021-04-15T16:34:47.558Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T20:15:48Z","system_modified_dtsi":"2020-07-10T14:53:18Z","has_model_ssim":["StudentWork"],"id":"xd07gv01k","accessControl_ssim":["1c716125-1e32-43be-a9fa-40fc63692a6f"],"hasRelatedMediaFragment_ssim":["nc580p12z"],"hasRelatedImage_ssim":["nc580p12z"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Be Epic"],"date_uploaded_dtsi":"2020-06-22T20:15:48Z","date_modified_ssi":"Fri Jul 10 10:53:17 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Hopperton, Tyler"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Grosse, Sabrina","Carpenter, Todd","Library Service, CECH","Grote, Kevin"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Imagine learning a new activity or going somewhere alone without feeling social isolation, loneliness, or anxiety. With Be Epic, you will never feel that way again. Be Epic is a social app which allows the user to select interests that they are already involved with or would like to be and create a personalized profile where they can share their adventures with others in a safe space. It includes different feeds depending on their selected interests where users can post information about what they are doing, where they are going, or who they are with. Users can stay updated and meet with one another in real time. Users can meet new partners, make connections, and even learn with a more experienced user. Never fear learning something new or doing something alone again with the help of Be Epic."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/assets/work-ff055336041c3f7d310ad69109eda4a887b16ec501f35afc0a547c4adb97ee72.png","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["8623j027g","nc580p12z"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["8623j027g","nc580p12z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"BE EPIC","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/xd07gv01k"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124932424564736,"timestamp":"2021-04-15T16:34:19.786Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T20:13:26Z","system_modified_dtsi":"2020-07-10T14:53:19Z","has_model_ssim":["StudentWork"],"id":"f1881n32t","accessControl_ssim":["2ed309c3-df99-403c-9c08-bb8c80d6c28a"],"hasRelatedMediaFragment_ssim":["r781wh40r"],"hasRelatedImage_ssim":["r781wh40r"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["Concerto"],"date_uploaded_dtsi":"2020-06-22T20:13:26Z","date_modified_ssi":"Fri Jul 10 10:53:18 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Vykhovanyuk, Bogdan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Eiselt, Ryan","Samson, Ryan","Limbert, Cory","Library Service, CECH"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["Many musicians and music fans currently do not have a dedicated social media platform to network with other like-minded people in their area. Because of this, users are resorting to websites not designed with music in mind, like Facebook and Craigslist, to interact. Concerto is an innovative website that looks to \r\nallow users to network, discover, and promote anything music related on its unique platform. Musicians and listeners alike can find valuable information on bands, upcoming shows, as well as receive recommendations based on their music listening preferences. Concerto is also a hub to connect fellow musicians who are looking for new band mates. By giving music fans a dedicated tool in Concerto, we strive to help strengthen musical communities and create a unique experience for our users. "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/r781wh40r?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["r781wh40r","5999n478z"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["r781wh40r","5999n478z"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"CONCERTO","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/f1881n32t"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124938570268672,"timestamp":"2021-04-15T16:34:25.646Z","score":0.00049999997},{"system_create_dtsi":"2020-06-22T20:10:45Z","system_modified_dtsi":"2020-07-10T14:53:21Z","has_model_ssim":["StudentWork"],"id":"xk81jm79q","accessControl_ssim":["05a5b417-b505-4abe-a9f5-618602d0ae01"],"hasRelatedMediaFragment_ssim":["4b29b751x"],"hasRelatedImage_ssim":["4b29b751x"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["WAM - Windows Automation Manager"],"date_uploaded_dtsi":"2020-06-22T20:10:45Z","date_modified_ssi":"Fri Jul 10 10:53:20 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Fall, Abdou"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Holzman, Andrew","Library Service, CECH","Adams, Ryan","Marshall, Alex"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["In modern business/enterprise environments, automation has become the driving force to improve products, workflow, and business practices. Managing where, when, and how these automated jobs are running can become an unwieldy task for many. Windows Task Scheduler, SQL Server Agent, SQL Server Report/Integration Services, and numerous other automation tasks all have their own interfaces. WAM (Windows Automation Manager) is a web-based automation application that allows users to quickly access scheduled jobs, log information, and access a job creation interface to perform a variety of automation tasks. Through it’s simplistic and to the streamlined design, WAM will allow system and network administrators to spend less time monitoring and scheduling tasks, and more time on projects and maintenance."],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/4b29b751x?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["4b29b751x","mk61rj35r"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["4b29b751x","mk61rj35r"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"WAM WINDOWS AUTOMATION MANAGER","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/xk81jm79q"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124930358870016,"timestamp":"2021-04-15T16:34:17.816Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Image","hits":4797,"label":"Image"},{"value":"Dataset","hits":3723,"label":"Dataset"},{"value":"Etd","hits":994,"label":"Etd"},{"value":"Document","hits":979,"label":"Document"},{"value":"Article","hits":963,"label":"Article"},{"value":"Student Work","hits":755,"label":"Student Work"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Snider, Jerry A. (senior collector)","hits":3484,"label":"Snider, Jerry A. (senior collector)"},{"value":"Tepe, Eric (record/image)","hits":3484,"label":"Tepe, Eric (record/image)"},{"value":"Huston, Ron","hits":2344,"label":"Huston, Ron"},{"value":"He, Si (co-collector)","hits":1093,"label":"He, Si (co-collector)"},{"value":"Meyer, David L.","hits":631,"label":"Meyer, David L."},{"value":"Davis, Jack","hits":611,"label":"Davis, Jack"}],"label":"Creator Sim"},{"name":"subject_sim","items":[{"value":"Kingdom: Plantae","hits":3453,"label":"Kingdom: Plantae"},{"value":"Phylum: Bryophyta","hits":3146,"label":"Phylum: Bryophyta"},{"value":"Class: Bryopsida","hits":2902,"label":"Class: Bryopsida"},{"value":"Biology","hits":2361,"label":"Biology"},{"value":"Order: Hypnales","hits":1190,"label":"Order: Hypnales"},{"value":"Order: Dicranales","hits":369,"label":"Order: Dicranales"}],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Arts and Sciences","hits":6145,"label":"Arts and Sciences"},{"value":"Engineering and Applied Science","hits":2769,"label":"Engineering and Applied Science"},{"value":"Design, Architecture, Art and Planning","hits":1235,"label":"Design, Architecture, Art and Planning"},{"value":"Other","hits":1070,"label":"Other"},{"value":"Libraries","hits":666,"label":"Libraries"},{"value":"Education, Criminal Justice, and Human Services","hits":541,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Biological Sciences","hits":3503,"label":"Biological Sciences"},{"value":"Mechanical and Materials Engineering","hits":2264,"label":"Mechanical and Materials Engineering"},{"value":"Other","hits":992,"label":"Other"},{"value":"Simpson Center for Urban Futures ","hits":784,"label":"Simpson Center for Urban Futures "},{"value":"Classics","hits":769,"label":"Classics"},{"value":"Romance \u0026 Arabic Languages \u0026 Literat","hits":644,"label":"Romance \u0026 Arabic Languages \u0026 Literat"}],"label":"Department Sim"},{"name":"language_sim","items":[{"value":"English","hits":1951,"label":"English"},{"value":"en_US","hits":224,"label":"en_US"},{"value":"English ","hits":145,"label":"English "},{"value":"Russian","hits":34,"label":"Russian"},{"value":"Spanish","hits":24,"label":"Spanish"},{"value":"German","hits":19,"label":"German"}],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)","hits":3484,"label":"University of Cincinnati, Margaret H. Fulford Herbarium (CINC)"},{"value":"University of Cincinnati","hits":3005,"label":"University of Cincinnati"},{"value":"University of Cincinnati: Romance and Arabic Languages and Literatures","hits":603,"label":"University of Cincinnati: Romance and Arabic Languages and Literatures"},{"value":"University of Cincinnati ","hits":100,"label":"University of Cincinnati "},{"value":"viDEO sAVant","hits":92,"label":"viDEO sAVant"},{"value":"Benjamin Britton","hits":60,"label":"Benjamin Britton"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2017","hits":2305,"label":"2017"},{"value":"","hits":211,"label":""},{"value":"2001-03-31","hits":181,"label":"2001-03-31"},{"value":"2017-10-31","hits":163,"label":"2017-10-31"},{"value":"2001-03-30","hits":156,"label":"2001-03-30"},{"value":"2001-03-29","hits":127,"label":"2001-03-29"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"1r66j250c","hits":3484,"label":"1r66j250c"},{"value":"79407x47z","hits":2123,"label":"79407x47z"},{"value":"05741w32f","hits":341,"label":"05741w32f"},{"value":"bc3871882","hits":225,"label":"bc3871882"},{"value":"x346d4806","hits":219,"label":"x346d4806"},{"value":"bc387z838","hits":189,"label":"bc387z838"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":12573,"label":"Work"},{"value":"Collection","hits":171,"label":"Collection"}],"label":"Generic Type Sim"}],"pages":{"current_page":179,"next_page":180,"prev_page":178,"total_pages":1275,"limit_value":10,"offset_value":1780,"total_count":12744,"first_page?":false,"last_page?":false}}}