Recherche
Nombre de résultats à afficher par page
Résultats de recherche
-
- Type:
- Student Work
- Description/Abstract:
- Passwords are not safe, and create vulnerabilities, yet, we rely heavily on them in nearly everything we do. A good password will exceed 10 characters, use a combination of numbers, upper case, lower case, and special characters. Good practice tells us not to reuse passwords. This is a lot to remember when accessing various tools and accounts in our work and private lives. Can a large company trust that a person is not using the same password when accessing company assets as they are at home? This issue is solved by using a MAGIK STICK as a multifactor authentication device that eliminates the need for employees to remember passwords for a company network. MAGIK STICK solves this conundrum by authenticating users via biometrics and generating a token for accessing applications and devices. This token is based on a TOTP (time based one-time password) algorithm.
- Creator/Author:
- Barr, Sean; Ryan, Kyle, and Library Service, CECH
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Gartner reports that there will be around 20.8 billion [IoT devices] by 2020. Among these devices are countless vulnerabilities and security concerns. As of now, there is no single device that remediates those vulnerabilities or even detects them. The Mirai botnet incident took countless websites offline and affected millions of people. What if there was a device that could have detected this sort of activity? Our product would have thwarted an attack of this type via network monitoring of each IoT device on a user’s home network. Our product would function as a plug and play device and would be able to detect abnormal IoT network activity. The objective is to ensure the devices are only operating based on necessity. This gives the owners peace of mind that their IoT devices are functioning normally. The number of IoT devices is going to surpass the number of mobile phones and computers in the coming years. This will require the need for additional security measures similar to that of antivirus. Our product is a step in the right direction for securing these devices
- Creator/Author:
- Schroeder, Michael; Library Service, CECH; Manahan, Stephan, and Lyons, Christopher
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Imagine learning a new activity or going somewhere alone without feeling social isolation, loneliness, or anxiety. With Be Epic, you will never feel that way again. Be Epic is a social app which allows the user to select interests that they are already involved with or would like to be and create a personalized profile where they can share their adventures with others in a safe space. It includes different feeds depending on their selected interests where users can post information about what they are doing, where they are going, or who they are with. Users can stay updated and meet with one another in real time. Users can meet new partners, make connections, and even learn with a more experienced user. Never fear learning something new or doing something alone again with the help of Be Epic.
- Creator/Author:
- Grosse, Sabrina; Carpenter, Todd; Library Service, CECH, and Grote, Kevin
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Many musicians and music fans currently do not have a dedicated social media platform to network with other like-minded people in their area. Because of this, users are resorting to websites not designed with music in mind, like Facebook and Craigslist, to interact. Concerto is an innovative website that looks to allow users to network, discover, and promote anything music related on its unique platform. Musicians and listeners alike can find valuable information on bands, upcoming shows, as well as receive recommendations based on their music listening preferences. Concerto is also a hub to connect fellow musicians who are looking for new band mates. By giving music fans a dedicated tool in Concerto, we strive to help strengthen musical communities and create a unique experience for our users.
- Creator/Author:
- Eiselt, Ryan; Samson, Ryan; Limbert, Cory, and Library Service, CECH
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- In modern business/enterprise environments, automation has become the driving force to improve products, workflow, and business practices. Managing where, when, and how these automated jobs are running can become an unwieldy task for many. Windows Task Scheduler, SQL Server Agent, SQL Server Report/Integration Services, and numerous other automation tasks all have their own interfaces. WAM (Windows Automation Manager) is a web-based automation application that allows users to quickly access scheduled jobs, log information, and access a job creation interface to perform a variety of automation tasks. Through it’s simplistic and to the streamlined design, WAM will allow system and network administrators to spend less time monitoring and scheduling tasks, and more time on projects and maintenance.
- Creator/Author:
- Holzman, Andrew; Library Service, CECH; Adams, Ryan, and Marshall, Alex
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- In 2015, the sale of tabletop games by small publishers topped $1 billion in the United States and Canada for the first time.1 In 2017, this total skyrocketed above $1.5 billion.2 In an age where digital screens are often uncomfortably pervasive, people have a growing desire for human contact away from technology. The explosive popularity of tabletop gaming showcases this very clearly. Currently, an average of over 10 tabletop games are being published each day, a staggering number.3 Due to the ever-growing number of choices, it can be very difficult to select a game that everyone will enjoy playing. To address this issue, the GameNight mobile application helps the members of a group select a range of games from their collection by breaking games down into their mechanical components, and then searching for a common interest for the group by looking for a commonly occurring mechanic. The application then suggests games that utilize this mechanic, providing an experience that everyone at the table will enjoy. The application can be used in multiple ways: for example, a user can designate games they already own as being in their collection, or they can designate games they are considering purchasing, using it as a purchasing aid. GameNight saves time and energy that can be better spent getting straight to gaming!
- Creator/Author:
- Trusty, Kelsey and Philpott, Reggie
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- The current Google search tool worked when searching for keywords but cannot answer specific questions well, leaving a void and many confused users. The current solution to this problem was to programmatically put in solutions for common questions, but many still go unanswered. This caused users to put a strain on the website owner’s helpdesk for problems it faces. The Smart Assistant was a powerful QnA bot that provided more accurate search results for to UC-related questions by leveraging Azure’s powerful AI system, tracking users when he/she interacts with the bot and remembering what solutions he/she selects for similar questions by future users. It was built on the Azure Cognitive Services platform and featured language recognition for similarly worded questions, a robust cloud network that can be scaled up/down as needed, and self-learning technology that required little maintenance by administrators
- Creator/Author:
- Berhan, Abel; Hughes, Parker, and Bengel, Peter
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- “In 2016, Researchers from the University of Illinois left 297 unlabeled USB flash drives around the university campus to see what would happen. 98% of the dropped drives were picked up by staff and students, and at least half were plugged into a computer in order to view the content. For a hacker trying to infect a computer network, those are irresistible odds” (Kaspersky Labs). Plug-and-play (PNP) technologies have become very common in today’s world, but there’s no reliable way to ensure that everything plugged into a computer will play nicely. Operating System Customs (OSC) aims to maintain the “plug-and-play” name by introducing a new layer to ensuring that everything plugged in is verified as 100% safe. This project ensures your computer’s safety as well as your network’s, identifying your external medium and scanning it to verify if a virus/malware was installed without your knowledge. After the scan, it’s either verified to be safe or dangerous and lists off any discovered corrupt files. OSC allows users to operate in a safe network and grant system administrators peace of mind.
- Creator/Author:
- Burnett, James; Watson, Mitchell, and Handra, Jacob
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Many people dread calling up their cell phone company, electric company or any other company with an automated answering system to fix an issue. Currently, the only way to call them is to call and listen through the options before you hear the option you need which is a waste of time. Based on an article on www.westuc.com, the average consumer can expect to spend around 43 days of their life waiting on hold listening to the automated answering machine. Our Phone Call Enhancement App is a way to make this process easier. The app will have a list of companies and their phone number with department information. Once you select the department the number will open in your phone app ready to be dialed. Once you hit the call button the call will be sent to the specific department of your choice, so you do not have to listen through all the options. Having this application available to users will avoid time wastage waiting when calling companies with automated answering machines.
- Creator/Author:
- Qiu, Xiang; Phuyal, Tapash, and Richter, Matthew
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
-
- Type:
- Student Work
- Description/Abstract:
- Many people envision the cloud as a service that “just works”. What most do not realize though, is that the “cloud” is in fact a co-location center, a building housing a massive datacenter that is willing to provide its resources to companies for an annual cost. Someone needs to maintain these co-location centers, and when searching, recruiters often look for someone with experience. Acquiring enterprise level, hands-on experience for the job can be both quite expensive and hard to come across. VR Datacenter (VDC) plans to fix this. VDC is an application that leverages users’ consumer hardware to simulate an enterprise level environment. VDC aims to allow users to create assets that not only appear physically in the virtual reality environment, but also have functionality tied into a VMWare vSphere server environment. This includes controlling device connectivity, power, rackmount location (RU), readouts from the virtual machines (VMs), etc. VDC plans to better define the breadth of knowledge that an entry level IT administrator possesses.
- Creator/Author:
- Kenkel, Matthew; Reuss, Michael; Drury, Rebecca, and Lang, Elliot
- Submitter:
- CECH Library Service
- Date Uploaded:
- 06/22/2020
- Date Created:
- 2019-04
- License:
- Attribution-NonCommercial-NoDerivs 4.0 International
