Recherche
Filtrage par:
Date Created
2019-04
Supprimer la restriction Date Created: 2019-04
Nombre de résultats à afficher par page
Résultats de recherche
- Type:
- Student Work
- Description/Abstract:
- With over 250,000 unique logins per day, Kroger Citrix requires significant administrative resources. Ticket counts periodically exceed the capacity of the Kroger Support Center (KSC) - most issues are simple but have time consuming fixes. To reduce overhead, this team intends to implement a tool for KSC members that will streamline functions such as: (1) resetting Citrix users’ profiles, (2) verifying Citrix entitlements, and (3) viewing user Active Directory information. An additional goal is to enable KSC members to resolve an increased number of tickets without the need for escalation. This team predicts a recovery of approximately ten to fifteen minutes per incident, providing significant cost and time savings. Reduced overhead will allow more resources for investigating potential access violations and improving account controls.
- Creator/Author:
- Ayers, Jeffrey; Hibbs, John, and Burden, Erin
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
22. Hometown Bazaar
- Type:
- Student Work
- Description/Abstract:
- Since early 1800s, yard sales and sale types alike have been a great way to declutter your house, discover rare items, and find a good deal. According to the poll conducted by Statistic Brain Research Institute, the average number of self-arranged sales held weekly in the USA is 165,000. However, the method of advertising and promoting these sales has not kept up with modern technology. Introducing: Hometown Bazaar! This sophisticated, mobile-responsive web application allows buyers and sellers to take advantage of modern technology. It saves time and effort, maximizes profits while still promoting the small-town person-to-person interaction of personal item sales. Hometown Bazaar offers advanced search features and filtering, communication with the seller, customization, feedback options, and a community event organizational system. All of this is free of charge while providing functional performance, easy navigation and eye-appealing design, as well as ensuring high security of all transactions and personal information.
- Creator/Author:
- Meyer, Justin; Helton, Katya, and Paul, Jason
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
- Type:
- Student Work
- Description/Abstract:
- The use of Phishing Audit System has the potential to train and educate organizations and their employees to be more proactive when dealing with phishing emails. Phishing is the leading cause of cyber-attacks around the world and is increasing each year. Phishing comes in the form of an email that is made to look like it’s coming from a trusted source but contains malware or takes you to an illegitimate website to steal personal information. Our solution to reduce the number of attacks is to create the Phishing Audit System. This system creates a customized, scheduled, and automated phishing simulation. This allows you to track the progress of users understanding and interacting with phishing emails. Additionally, this system provides users with the necessary training material to identify the phishing attacks.
- Creator/Author:
- Hampton, James; Combs, James; Stevens, Tyler, and Woody, Joshua
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
- Type:
- Student Work
- Description/Abstract:
- Fortune 500 companies need a simple, single solution to help them track their progress towards their Social Responsibility goals. To make the social responsibility value come to life, companies allow their employees to take paid time off to volunteer. Companies also sponsor community outreach events via employee-led Business Resource Groups (BRGs). Today, most companies don’t have a single solution or single source of truth that tracks where the company’s money or employee volunteer time is going. To solve that problem, our team created Employees Becoming Neighbors. Our product is a “one-stop shop” for companies to track their employees’ paid volunteer time off and give their BRGs a tool to manage their community events. Our product also gives company Executives one place to run reports to see how their company is meeting their goals. We are doing this because we wanted to make a product that meets a real-world need and applies to the private sector.
- Creator/Author:
- Johnson,Micah; Goodwin, Zach, and Allen, James
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
25. Campus Connect
- Type:
- Student Work
- Description/Abstract:
- Within the past five years, The University of Cincinnati hasn’t had a consistent Campus Link solution for managing student groups, none of which have had a mobile solution. The current University solution does not reach the expectations of students and organization leaders. Campus Connect provides an active and intuitive user experience with both web and mobile. The project aims on giving the users an all in one solution that allows them to actively see posts and meetings from the clubs or organizations they have joined through the application. Campus Connect will consist of a series of features that allow the user to search and join organizations of their choice. Organizations create and edit posts as well as their own personal organizational pages. Campus Connect allows for an easy communication between students and organizations.
- Creator/Author:
- Sinha. Nikhil and Polen, Harry
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
- Type:
- Student Work
- Description/Abstract:
- Spam Detection over Encrypted Emails with Intel SGX Emails play a pivotal role in business and everyday communication. There are millions of email messages being sent each day that contain incredibly sensitive information. This sensitive data can be easily parsed by passive attackers on an email server. Leveraging Intel’s SGX we can mitigate this problem by using enclaves. These are private regions of memory that are protected from processes running at higher privilege levels. Decrypting emails using SGX on an Encrypted mail server makes it much more difficult for passive attackers to get any useful data. On top of that this solution takes into account that sender reputation filters are not very effective since it is quite easy for an email address to be compromised. Decrypting emails via Intel SGX improves the general security of Emails on servers where it is running.
- Creator/Author:
- Efford, Reid; Welly, Jacob, and Ciepichal, Brian
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
- Type:
- Student Work
- Description/Abstract:
- According to the International Agency for the Prevention of Blindness, an estimated 36 million people are blind and an additional 217 million have moderate to severe visual impairment. This means that a total of 253 million individuals must rely on their four available senses, primarily touch, in order to perceive their surroundings. One major limitation of this is that the individual must be within arm’s reach (or cane’s reach) in order to determine what is in front of them. Iris changes this by providing a mobile application with a voice-controlled user interface to improve environmental awareness for the blind. With Iris, users are able to take a picture and have the application describe it to them with additional information on specific entities within the picture if requested. Through accessibility features and the power of machine learning, Iris is an extension to the user’s senses.
- Creator/Author:
- Guckenberger, Tristan and Anderson, William
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
- Type:
- Student Work
- Description/Abstract:
- Critical infrastructure are the systems deemed necessary to live with our current modern standards. These systems require a combination of support systems and SCADA systems that control the machinery to provide us our essentials we take for granted such as power and water. Qualified cybersecurity professionals are becoming increasingly more difficult to find to defend these networks. We created a learning tool to help facilitate college student’s knowledge of defending critical infrastructure, and as we know, the best way to defend is to learn how the attacker will think. This tool consists of a series of virtual machines within two sub scenarios, a water treatment plant and a power plant. Students will be able to conduct penetration tests of these in a simulated environment in order to learn more about critical infrastructure and how to defend it.
- Creator/Author:
- Lindquist, Chase; Alghalayani, Feras, and Barton, Nate
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
29. Thunder Cloud
- Type:
- Student Work
- Description/Abstract:
- Amazon Web Services (AWS) and Microsoft Azure are the two leading cloud solution services in a market worth $18.2 billion in 2016, and it is expected to worth $40 billion by the end of 2018. Microsoft’s Azure market share has grown from 8.7% in 2016 to 29.4% in 2018 thanks, in large part, to their cloud-first strategy in recent years. Many enterprises have been left cloudlocked, leaving them stuck working with either AWS or Azure due to budget and time restrictions, while some larger enterprises utilize both AWS and Azure. Being able to securely and cheaply switch between cloud services today will save companies time and money, as well as keep their options open if one works better for them than the other. Thunder Cloud will help solve this cloud lock issue between AWS and Azure for companies by taking data from one service, converting it the format of the other, and then uploading it to that platform
- Creator/Author:
- Varker, Cameron; Sherman, Alexious, and Ward, Sean
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
- Type:
- Student Work
- Description/Abstract:
- According to the CDC, the prevalence of obesity was 39.8% and affected about 93.3 million of US adults in 2015-2016. Our team wants to make an impact and tackle this obesity epidemic in America. Our fitness application, OneFit, will take one stride closer to finding a solution. Our objective with this application is to create an application that consolidates all health tools into one resource while providing an accessible and engaging user experience for all ages. Our team will use critical fitness data analysis and provide thorough measurable results for our end users. We will utilize custom planning, personalized work out strategy, and overall health monitoring technology to critique a wholesome health plan for each person. This application will create a fitness network to connect and build a more collaborative workout environment. We envision that this application will inspire people and progress society overall towards a healthier lifestyle.
- Creator/Author:
- Lim, Ivan; Lieser, Anthony; Bertke, Michael, and Hardwick, Adele
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International