Buscar
Filtrado por:
Creador
Library Service, CECH
Eliminar la restricciónCreador: Library Service, CECH
El número de resultados a mostrar por página
Resultados de la búsqueda
- Type:
- Student Work
- Descripción/Resumen:
- Accessible Wayfinding: McMapping Edition is route-finding web application, compliant with guidelines laid out in the Americans with Disabilities Act Standards for Accessible Design, that provides users with accessible routes within the Arts and Sciences building, formally known as McMicken Hall. The University of Cincinnati's recent accessibility initiative uncovered significant deficits in the campus’ overall accessibility. While this initiative has improved many elements of the university campus, it has yet to address needed improvements for those navigating inside UC’s buildings. The McMapping wayfinding web application is designed to provide students, faculty, staff, and visitors with mobility concerns the means to navigate through the Arts and Sciences building with peace of mind. By utilizing Phaser, the application will feature visual route guidance as an individual can first, select a starting location and a target destination within the establishment. The program provides the most accessible route to that spot. In addition to accessible route guidance, authenticated users can use saved routes and notification features to quickly identify previously used routes and to help other users navigate their way to success!
- Creador/Autor:
- Million, Kharajae; Overmyer, William; Smith, Matthew; Library Service, CECH; Catherwood, Anne, and Burke, Mollie
- Peticionario:
- CECH Library Service
- Fecha modificada:
- 06/11/2021
- Fecha modificada:
- 06/11/2021
- Fecha de creacion:
- 2021-04
- Licencia:
- Attribution-NonCommercial-NoDerivs 4.0 International
52. BeUrDJ
- Type:
- Student Work
- Descripción/Resumen:
- The average cost to host a DJ for a 3-4 hour set is about $1200; for local venues, bars and events that can be an expensive investment (HireRush). There are other music applications that allow users to add songs to a community queue but fail at providing a solution for events and venues. BeUrDJ is a web-based application that is oriented to allow all music listeners at social gatherings to engage in the song selection. BeUrDJ allows all music listeners to easily input their music choice to the group. The DJ sets up each session where listeners can join, and each session is designed to be highly customizable. DJs can set filters for each session to match the atmosphere of the event and the queue will be updated with recommended songs if there are no songs left in the queue. The queue is then modified based on the upvotes and downvotes for each song. The song with the most amount of upvotes verse downvotes will be first in the queue. This allows all music listeners to easily input their opinion to the song selection. BeUrDJ provides listeners with an interactive music listening experience by giving the power to the listeners.
- Creador/Autor:
- Onega, Thomas; Library Service, CECH, and Brunner, Samuel
- Peticionario:
- CECH Library Service
- Fecha modificada:
- 07/06/2020
- Fecha de creacion:
- 2020-04
- Licencia:
- All rights reserved
53. 1819 Mobile App
- Type:
- Student Work
- Descripción/Resumen:
- Have you had a chance to visit the 1819 Innovation hub yet? If not, you're probably not familiar with all the exciting opportunities and services the building has to offer. To some, the possibilities at 1819 can be quite overwhelming, but with the 1819 Mobile app, we make these opportunities more approachable. With our location based informational beacons and seamless check-in pre-registration process, you can skip to the front of the line and get right to work on your latest ideas and inventions. Using Apple’s Core Location services, the power of Swift, and the latest in Bluetooth low energy beacon technology, the 1819 Mobile app provides you with up to date contextual information about key locations within the University of Cincinnati’s 1819 Innovation Hub. The 1819 Mobile app ensures that you have access to the tools and information needed to succeed in your visit.
- Creador/Autor:
- DeMoss, Cameron; Library Service, CECH; Holschuh, Crhis, and Burns, Aidan
- Peticionario:
- CECH Library Service
- Fecha modificada:
- 06/30/2020
- Fecha de creacion:
- 2020-04
- Licencia:
- All rights reserved
54. Hypesafe
- Type:
- Student Work
- Descripción/Resumen:
- Phishing Emails are a problem as ubiquitous as email itself. According to Digital Guardian, over 90% of all cyber attacks now start with a phishing message (Guest, 2017). Additionally, with over 12% of targets clicking on any given phishing message (Verizon, 13), and 95% of all attacks on enterprise networks begin as a result of spear phishing, it is critical to not only know who clicks on these links, but also when a link was clicked. While there are many tools trying to prevent the message from ever getting in, only Hypersafe will enable instant visibility and scoping when a message inevitably gets through. This is accomplished by intercepting all inbound messages to a target’s email system, and then scanning messages for spam and malicious content, and then replacing every link contained within the message with a custom link that points to the Hypersafe Link Resolution Service. When a user clicks on a link, they first go through the Link Resolution Service to ensure that the link has not been identified as a phishing or otherwise malicious message. If the link is clean, then the user is seamlessly redirected to their intended target. If the link is malicious, the user is redirected to an education and awareness page, thus hindering the attack. In order to ensure reliable service, Hypersafe is built atop the proven Amazon Web Services Platform to enable best in class availability, scalability, and security. The email processing and link resolution services are serverless, enabling Hypersafe to scale without any administrative burden and also cost very little to operate. Finally, there is a web administration portal that administrators can use to interact with the service to manually flag links, senders, and domains as malicious as well as view statistics on who has clicked on a certain link. By taking the uncertainty of email away from the user, Hypersafe will be an invaluable partner in each customer’s defense toolkit.
- Creador/Autor:
- Iacobelli, Tony; Johnson, Peter; Burchette, Anthony, and Library Service, CECH
- Peticionario:
- CECH Library Service
- Fecha modificada:
- 06/22/2020
- Fecha de creacion:
- 2019-04
- Licencia:
- Attribution-NonCommercial-NoDerivs 4.0 International
- Type:
- Student Work
- Descripción/Resumen:
- "Today, a public cloud is a top priority for many enterprises. Statistics show cloud infrastructure usage has grown from 29 percent in 2017 to 38 percent in 2018." With a wide variety of options, finding the right cloud solution can be inefficient and costly for companies. This is where Omni-Cloud Solutions helps during their digital transformation journey. Our organization aims to make finding the right solution simple with an easy to use web application-based wizard, which will help organizations choose between IaaS, SaaS, XaaS, PaaS, and different storage options from a variety of cloud service providers. The service we provide will allow the organization to provide specific details about them and receive a tailored cloud solution plan based around important metrics such as cost, storage, and availability. Reducing the amount of research previously devoted to migrating their organization to the cloud solution will save time and money allowing them to focus on their own projects.
- Creador/Autor:
- Terle, Paul; Turner, Kevin; Price, Gordon; Library Service, CECH, and Cline, Aaron
- Peticionario:
- CECH Library Service
- Fecha modificada:
- 06/22/2020
- Fecha de creacion:
- 2019-04
- Licencia:
- Attribution-NonCommercial-NoDerivs 4.0 International
- Type:
- Student Work
- Descripción/Resumen:
- Passwords are not safe, and create vulnerabilities, yet, we rely heavily on them in nearly everything we do. A good password will exceed 10 characters, use a combination of numbers, upper case, lower case, and special characters. Good practice tells us not to reuse passwords. This is a lot to remember when accessing various tools and accounts in our work and private lives. Can a large company trust that a person is not using the same password when accessing company assets as they are at home? This issue is solved by using a MAGIK STICK as a multifactor authentication device that eliminates the need for employees to remember passwords for a company network. MAGIK STICK solves this conundrum by authenticating users via biometrics and generating a token for accessing applications and devices. This token is based on a TOTP (time based one-time password) algorithm.
- Creador/Autor:
- Barr, Sean; Ryan, Kyle, and Library Service, CECH
- Peticionario:
- CECH Library Service
- Fecha modificada:
- 06/22/2020
- Fecha de creacion:
- 2019-04
- Licencia:
- Attribution-NonCommercial-NoDerivs 4.0 International
57. FortifIoT
- Type:
- Student Work
- Descripción/Resumen:
- Gartner reports that there will be around 20.8 billion [IoT devices] by 2020. Among these devices are countless vulnerabilities and security concerns. As of now, there is no single device that remediates those vulnerabilities or even detects them. The Mirai botnet incident took countless websites offline and affected millions of people. What if there was a device that could have detected this sort of activity? Our product would have thwarted an attack of this type via network monitoring of each IoT device on a user’s home network. Our product would function as a plug and play device and would be able to detect abnormal IoT network activity. The objective is to ensure the devices are only operating based on necessity. This gives the owners peace of mind that their IoT devices are functioning normally. The number of IoT devices is going to surpass the number of mobile phones and computers in the coming years. This will require the need for additional security measures similar to that of antivirus. Our product is a step in the right direction for securing these devices
- Creador/Autor:
- Schroeder, Michael; Library Service, CECH; Manahan, Stephan, and Lyons, Christopher
- Peticionario:
- CECH Library Service
- Fecha modificada:
- 06/22/2020
- Fecha de creacion:
- 2019-04
- Licencia:
- Attribution-NonCommercial-NoDerivs 4.0 International
58. Be Epic
- Type:
- Student Work
- Descripción/Resumen:
- Imagine learning a new activity or going somewhere alone without feeling social isolation, loneliness, or anxiety. With Be Epic, you will never feel that way again. Be Epic is a social app which allows the user to select interests that they are already involved with or would like to be and create a personalized profile where they can share their adventures with others in a safe space. It includes different feeds depending on their selected interests where users can post information about what they are doing, where they are going, or who they are with. Users can stay updated and meet with one another in real time. Users can meet new partners, make connections, and even learn with a more experienced user. Never fear learning something new or doing something alone again with the help of Be Epic.
- Creador/Autor:
- Grosse, Sabrina; Carpenter, Todd; Library Service, CECH, and Grote, Kevin
- Peticionario:
- CECH Library Service
- Fecha modificada:
- 06/22/2020
- Fecha de creacion:
- 2019-04
- Licencia:
- Attribution-NonCommercial-NoDerivs 4.0 International
59. Concerto
- Type:
- Student Work
- Descripción/Resumen:
- Many musicians and music fans currently do not have a dedicated social media platform to network with other like-minded people in their area. Because of this, users are resorting to websites not designed with music in mind, like Facebook and Craigslist, to interact. Concerto is an innovative website that looks to allow users to network, discover, and promote anything music related on its unique platform. Musicians and listeners alike can find valuable information on bands, upcoming shows, as well as receive recommendations based on their music listening preferences. Concerto is also a hub to connect fellow musicians who are looking for new band mates. By giving music fans a dedicated tool in Concerto, we strive to help strengthen musical communities and create a unique experience for our users.
- Creador/Autor:
- Eiselt, Ryan; Samson, Ryan; Limbert, Cory, and Library Service, CECH
- Peticionario:
- CECH Library Service
- Fecha modificada:
- 06/22/2020
- Fecha de creacion:
- 2019-04
- Licencia:
- Attribution-NonCommercial-NoDerivs 4.0 International
- Type:
- Student Work
- Descripción/Resumen:
- In modern business/enterprise environments, automation has become the driving force to improve products, workflow, and business practices. Managing where, when, and how these automated jobs are running can become an unwieldy task for many. Windows Task Scheduler, SQL Server Agent, SQL Server Report/Integration Services, and numerous other automation tasks all have their own interfaces. WAM (Windows Automation Manager) is a web-based automation application that allows users to quickly access scheduled jobs, log information, and access a job creation interface to perform a variety of automation tasks. Through it’s simplistic and to the streamlined design, WAM will allow system and network administrators to spend less time monitoring and scheduling tasks, and more time on projects and maintenance.
- Creador/Autor:
- Holzman, Andrew; Library Service, CECH; Adams, Ryan, and Marshall, Alex
- Peticionario:
- CECH Library Service
- Fecha modificada:
- 06/22/2020
- Fecha de creacion:
- 2019-04
- Licencia:
- Attribution-NonCommercial-NoDerivs 4.0 International
- « Anterior
- Siguiente »
- 1
- 2
- 3
- 4
- 5
- 6
- 7