Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 272

Full-Text Articles in Entire DC Network

A Guide To Documenting Software Design For Maximum Software Portability For Software Defined Radios, Joseph Snively Dec 2012

A Guide To Documenting Software Design For Maximum Software Portability For Software Defined Radios, Joseph Snively

Regis University Student Publications (comprehensive collection)

The use of software defined communications systems is growing incredibly fast. The field of software engineering as a discipline has not adequately addressed the subject of software portability which makes large and costly software development efforts less ready to port to future platforms. By understanding the causes of portability problems, they can either be avoided altogether in development or very well documented so that they are easier to overcome in future efforts. Literature, case studies, and surveys are used to collect opinions and information about large software programs where portability is a desirable characteristic in order to best establish the …


Simplified Single Source Xml Model: For Student-Centered Educational Content Management, Tamara K. Taylor Nov 2012

Simplified Single Source Xml Model: For Student-Centered Educational Content Management, Tamara K. Taylor

Regis University Student Publications (comprehensive collection)

This study investigates XML as a single source, recommending solutions and defining future needs for educators to manage student-centered educational content for diverse user preferences and multi-modal delivery. This research proposes a simplified XML single source model for educational course content management and XSL transformation of course material into multi-modal display/output that enables student-centered learning. The reviewed literature exposed four problem areas related to content management in which an XML single source might be a solution. Reviewed and synthesized literature related to XML into a cubed relationship with opposing the sides of the cube (content management/single source, corporate goals/educational goals …


Extended Bridge Software Design Pattern, Andrew J. Haigh Nov 2012

Extended Bridge Software Design Pattern, Andrew J. Haigh

Regis University Student Publications (comprehensive collection)

Software engineers are taught that they should separate form and function. This allows a user interface or front-end to be designed and implemented independently of the engine or back-end. Using an abstracted interface class provides the opportunity to develop different user interfaces for the same back-end, as each new user interface will all be derived from this agreed upon abstracted interface. Using the Bridge pattern allows the user to also decouple the abstraction from its implementation, providing additional flexibility as they developed multiple user interfaces. However, user interfaces are typically designed as a single unit, the renderer, even the Bridge …


Introduction Of Key Performance Indicators To The Dynamics Of Planned Change: A Modern Study, Tommy Wells Oct 2012

Introduction Of Key Performance Indicators To The Dynamics Of Planned Change: A Modern Study, Tommy Wells

Regis University Student Publications (comprehensive collection)

A private High Technology firm whose headquarters are located in the Midwest has just completed several upgrades to replace an in-house legacy application system in which the primary use was to track defects of the firm's custom made software. The firm's implementation of a third party's software suite to replace the in-house legacy application was studied using a case study method, which implemented key performance indicators to the change theory called "The Dynamics of Planned Change" introduced by Lippitt, Watson, and Westley. The key performance indicators were introduced as a way to determine if the firm's actions could be validated …


Transitioning From Relational To Nosql: A Case Study, John Mcphillips Aug 2012

Transitioning From Relational To Nosql: A Case Study, John Mcphillips

Regis University Student Publications (comprehensive collection)

Data storage requirements have increased dramatically in recent years due to the explosion in data volumes brought about by the Web 2.0 era. Changing priorities for database system requirements has seen NoSQL databases emerge as an alternative to relational database systems that have dominated this market for over 40 years. Web-enabled, always on applications mean availability of the database system is critically important as any downtime can translate in to unrecoverable financial loss. Cost is also hugely important in this era where credit is difficult to obtain and organizations look to get the maximum from their IT infrastructure from the …


Knowledge Management Across Cultural Boundaries: Global Organizational Knowledge-Sharing, Jeffrey Harling Aug 2012

Knowledge Management Across Cultural Boundaries: Global Organizational Knowledge-Sharing, Jeffrey Harling

Regis University Student Publications (comprehensive collection)

The practice of knowledge management is becoming pervasive in the modern business world. Yet, as the corporate world globalizes at an alarming rate, the process of how knowledge is captured and shared does not address the cultural nuances of those new participants spread across nearly every global region. Academically, knowledge management itself does rely on three primary pillars for success; those being process, technology, and culture. However, the culture aspect in the formal knowledge programs is more closely aligned with influencing users to share knowledge that they would otherwise hold close as an asset of their gained expertise. While this …


Peoplesoft Enterprise Change Assistant's Efficiencies, Eric Tijerina May 2012

Peoplesoft Enterprise Change Assistant's Efficiencies, Eric Tijerina

Regis University Student Publications (comprehensive collection)

This document examines the efficiencies of the PeopleSoft Enterprise Change Assistant (ECA) in performing upgrades to the PeopleSoft Enterprise software applications. The ECA tool increases quality of upgrades through the reduction of manual steps and, in doing so, limits risk of manual errors. The PeopleSoft Enterprise software upgrade process is a complicated and time-consuming process. Because the PeopleSoft applications are business critical systems, the upgrade of the PeopleSoft applications needs to be performed in a careful and timely manner. The PeopleSoft Enterprise Change Assistant was developed to automate many of the processes involved in the upgrade. It provides a means …


Mobile Technology Update To Delone And Mclean Model Of Information Success, Jason Ryberg Apr 2012

Mobile Technology Update To Delone And Mclean Model Of Information Success, Jason Ryberg

Regis University Student Publications (comprehensive collection)

Senior managers are challenged to measure the success of their IT systems when justifying technology investments needed to meet the organization"â„¢s mission. Due to increasing implementation of mobile technology, enterprise adoption of smartphones is no exception. Traditionally, the DeLone and McLean Information Systems (IS) Success Model has been proven as a valid framework for measuring IS success. However, it has not been updated to address the success variables related to mobile technology. Many studies on mobile technology have reviewed mobile success, but none have attempted theoretical assimilation. This thesis attempts to correct this situation by examining the DeLone and McLean …


Development Of Database And Software Modules To Identify Case Relationships Using Unstructured Data, Alberto D. Lombardo Jan 2012

Development Of Database And Software Modules To Identify Case Relationships Using Unstructured Data, Alberto D. Lombardo

Regis University Student Publications (comprehensive collection)

In this study, I intend to show how text based unstructured data, such as word processor documents and e-mails, can be systematically parsed for instances of data classes. Data classes can be any data type that can be fully described using the defined syntax of regular expressions. Examples of data classes can include SHA1, or MD5 hash values, Internet Protocol (IP) addresses, or any other data type whose format is well defined. Furthermore, possible correlations between datasets may be identified by grouping instances of equal or similar values within a data class. This approach of utilizing regular expressions to define …


The Vulnerability Assessment And Penetration Testing Of Two Networks, Steven L. Simpson Dec 2011

The Vulnerability Assessment And Penetration Testing Of Two Networks, Steven L. Simpson

Regis University Student Publications (comprehensive collection)

Vulnerability assessments and penetration testing are two approaches available for use by internet security practitioners to determine the security posture of information networks. By assessing network vulnerabilities and attempting to exploit found vulnerabilities through penetration testing security professionals are able to evaluate the effectiveness of their network defenses by identifying defense weaknesses, affirming the defense mechanisms in place, or some combination of the two. This project is a discussion of the methods and tools used during the vulnerability assessment and penetration testing, and the respective test results of two varied and unique networks. The assessment and testing of the first …


An Analysis Of User-Centric Identity Technology Trends, Openid's First Act, Peter Motykowski Nov 2011

An Analysis Of User-Centric Identity Technology Trends, Openid's First Act, Peter Motykowski

Regis University Student Publications (comprehensive collection)

Identity technologies within Internet applications have evolved at an aggressive pace over the past decade. As a result, a variety of user-centric identity management technologies are available on the Internet today. The user-centric identity technology realm has become a fragmented ecosystem of standards, techniques, and technical approaches to identity management. A symptom of this fragmentation is the sluggish adoption of user-centric identity technologies by Internet users. A study titled, An Analysis of User-Centric Identity Technology Trends, OpenID"â„¢s First Act, aims to reveal identity technology adoption patterns of users that engage in the use of Internet applications secured by an authentication …


Data Warehouse And Business Intelligence: Comparative Analysis Of Olap Tools, Mahesh Kumar Bhetwal Nov 2011

Data Warehouse And Business Intelligence: Comparative Analysis Of Olap Tools, Mahesh Kumar Bhetwal

Regis University Student Publications (comprehensive collection)

Data Warehouse applications are designed basically to provide the business communities with accurate and consolidated information. The objective of Data Warehousing applications are not just for collecting data and reporting, but rather for analyzing, it requires technical and business expertise tools. To achieve business intelligence it requires proper tools to be selected. The most commonly used Business intelligence (BI) technologies are Online Analytical Processing (OLAP) and Reporting tools for analyzing the data and to make tactical decision for the better performance of the organization, and more over to provide quick and fast access to end user request. This study will …


Exploring Information Technologies To Support Shotgun Proteomics, Alexander M. Mendoza Nov 2011

Exploring Information Technologies To Support Shotgun Proteomics, Alexander M. Mendoza

Regis University Student Publications (comprehensive collection)

Shotgun proteomics refers to the direct analysis of complex protein mixtures to create a profile of the proteins present in the cell. These profiles can be used to study the underlying biological basis for cancer development. Closely studying the profiles as the cancer proliferates reveals the molecular interactions in the cell. They provide clues to researchers on potential drug targets to treat the disease. A little more than a decade old, shotgun proteomics is a relatively new form of discovery, one that is data intensive and requires complex data analysis. Early studies indicated a gap between the ability to analyze …


Continuous Monitoring In The Cloud Environment, Victoria Nyffeler Oct 2011

Continuous Monitoring In The Cloud Environment, Victoria Nyffeler

Regis University Student Publications (comprehensive collection)

The National Institute of Standards and Technology introduced a risk management framework that concludes with a process for continuous monitoring. Continuous monitoring is a way to gain near real-time insight into the security health of an information technology environment. The cloud environment is unique from other environments in the way that resources are virtualized and shared among many cloud tenants. This type of computing has been gaining popularity as a solution for organizations to purchase resources as an on-demand service in the same way that an organization purchases utilities today. In order to experience the benefits promised by the emergence …


An Inquiry Regarding The Development Of An Effectual Architecture Framework Supporting Next Generation 9-1-1, Patrick Purdy Oct 2011

An Inquiry Regarding The Development Of An Effectual Architecture Framework Supporting Next Generation 9-1-1, Patrick Purdy

Regis University Student Publications (comprehensive collection)

The emergency 9-1-1 service is a vital part of our nation"â„¢s emergency response and disaster preparedness systems. At last count there were 6100 Public Safety Answering Points across the United States, 97 of those reside in the State of Colorado, and the citizens of the United States cannot email, text, or instant message these types of non-traditional communication to those Public Safety Answering Points due to technological limitations. The trends in personal communication technologies are accelerating the obsolescence of the current 9-1-1 systems. The Public Safety Answering Point of today is designed to accept and process voice media only; and …


The Insider Threat, Jacinda L. Wunderlich Oct 2011

The Insider Threat, Jacinda L. Wunderlich

Regis University Student Publications (comprehensive collection)

The Insider threat is defined similarly by experts in the information technology world for businesses, but addressing the threat has not been of great focus for most organizations. Technology and the Internet have grown exponentially over the past decade leading to changes in how business is conducted. Some basic business practices remain the same; protect the organization and its customers from breach of privacy. How data is gathered, stored, and retrieved has changed. Protecting the perimeter is still important, but these changes in technology now open the doors to a new threat; one that is known but not commonly protected …


Drawbacks With It Outsourcing; Dealing With The End Of The Contract, Michael Muntean Sep 2011

Drawbacks With It Outsourcing; Dealing With The End Of The Contract, Michael Muntean

Regis University Student Publications (comprehensive collection)

Many companies have looked to outsourcing Information Technology infrastructure and business processes as a means to save capital and streamline company business and assets. While companies initially approach outsourcing engagements concentrating on the migration of data and services to the vendor company, they rarely take into account potential issues that could possibly cause an outsourcing engagement to fail. Failure to address these potential issues within the contract can lead a business to be stuck in an outsourcing engagement that offers little to no benefit to the company. This project presents the details of a survey performed at a business that …


Investigation Of Efficient Unified Threat Management In Enterprise Security, Ryan Lynn Sep 2011

Investigation Of Efficient Unified Threat Management In Enterprise Security, Ryan Lynn

Regis University Student Publications (comprehensive collection)

This thesis explores the problems that exist today with perimeter security in data communications specifically the disparate architecture that exists to mitigate risk. Currently there are many different components to the enterprise security perimeter that are not cohesive and do not collaborate well to form an efficient, scalable, operationally supportable gateway design. The thesis breaks down this problem by illustrating the shortcomings of current technologies. These illustrations are used in conjunction with published research and authored research to provide solid footing for the idea of a unified threat management or UTM model. In this model, threat prevention techniques are consolidated …


Analysis Of Windows Cardspace Identity Management System, Thomas Hanrahan Aug 2011

Analysis Of Windows Cardspace Identity Management System, Thomas Hanrahan

Regis University Student Publications (comprehensive collection)

The Internet, which was originally developed for academic purposes, has expanded and been applied to commercial and business enterprises. It is possible to purchase airline tickets, check bank balances and communicate through e-mail with each other through the Internet. These services can all be performed relatively easily with the proliferation of Internet Service Providers and the lower cost of Personal Computers. The development of the Internet has also had a huge impact on businesses with the growth of e-commerce, e-banking and the tremendous growth in email traffic. There is however a negative impact to this development of the Internet with …


Automated Database Refresh In Very Large And Highly Replicated Environments, Eric King Aug 2011

Automated Database Refresh In Very Large And Highly Replicated Environments, Eric King

Regis University Student Publications (comprehensive collection)

Refreshing non-production database environments is a fundamental activity. A non-productive environment must closely and approximately be related to the productive system and be populated with accurate, consistent data so that the changes before moving into the production system can be tested more effectively. Also if the development system has more related scenario as that of a live system then programming in-capabilities can be minimized. These scenarios add more pressure to get the system refreshed from the production system frequently. Also many organizations need a proven and performant solution to creating or moving data into their nonproduction environments that will neither …


Examining Military Retention Rates Of It Service Members: Research Towards Mitigating The Loss Of It Professional Service Members, Paul B. Warner Aug 2011

Examining Military Retention Rates Of It Service Members: Research Towards Mitigating The Loss Of It Professional Service Members, Paul B. Warner

Regis University Student Publications (comprehensive collection)

The turnover rate for information technology professionals in the military is high due to a demand for skilled information technology (IT) professionals in the private sector that value the IT training professionals receive in the military, and which can offer the compensation to lure military personnel to the civilian market. The Department of Defense consistently invests a great deal of time and money into Information Technology trained service members, only to lose them to attractive job positions with civilian companies which are in demand for their specialized skills. With a MOS (mission of service) field that requires a larger monetary …


Erp Implementation: An Investigation Into Social Capital And Knowledge Extraction In The Public Sector., Corey E. Jensen Aug 2011

Erp Implementation: An Investigation Into Social Capital And Knowledge Extraction In The Public Sector., Corey E. Jensen

Regis University Student Publications (comprehensive collection)

The elements of a successful Enterprise Resource Planning implementation strategy have been widely researched in the information technology field. Many have sought to compile a complete list of attributes that, if utilized, would guarantee a successful ERP implementation while also adhering to relative time and budget constraints. While several critical success factors have been identified and further enabled higher success rates in evolving ERP implementation strategy, there appears to be room for additional improvement. Extracting essential corporate knowledge from existing information systems in effort to implement an ERP solution is often one of the most challenging tasks of the implementation …


Computer Security Policy: Preventing Vulnerabilities And The Impact Of Selective Enforcement On An Organization, Latrice D. Parker-Stewart Jul 2011

Computer Security Policy: Preventing Vulnerabilities And The Impact Of Selective Enforcement On An Organization, Latrice D. Parker-Stewart

Regis University Student Publications (comprehensive collection)

This project focuses on the importance of a computer security policy as a whole. It also looks at how security policies assist in preventing vulnerabilities that may be instigated by employees. Moreover, the project views how the concept of selective enforcement can affect and impact an organization. This project delves into actual cases of employee misconduct in various organizations. It explains how policies were violated and the repercussions of these various misdeeds. Finally the project discusses different items that a good security policy should have and how important it is for policies to be enforced. It is vital that an …


A Fuzzy Logic Stock Trading System Based On Technical Analysis, Sammy Zeigenbein Jun 2011

A Fuzzy Logic Stock Trading System Based On Technical Analysis, Sammy Zeigenbein

Regis University Student Publications (comprehensive collection)

Technical analysis of financial markets involves analyzing past price movements in order to identify favorable trading opportunities. The objective of this research was to demonstrate that a fuzzy logic stock trading system based on technical analysis can assist average traders in becoming successful by optimizing the use of technical indicators and trading rules that experts use to identify when to buy and sell stock. Research of relevant literature explored the current state of knowledge in methodologies for developing and validating trading systems using technical indicators and fuzzy logic trading systems, providing guidelines for the development and evaluation of the system. …


Towards A Traceable Enterprise Architecture For Small- And Medium-Sized Enterprises, Brian R. Houghtaling Jun 2011

Towards A Traceable Enterprise Architecture For Small- And Medium-Sized Enterprises, Brian R. Houghtaling

Regis University Student Publications (comprehensive collection)

The practice of Enterprise Architecture (EA) continues to develop. Many large organizations are using EA processes and practices to help manage their complex set of integrated processes and applications. The set of integrated processes and applications required to meet their unique business requirements. Large organizations inherently recognize that an effective EA assists the enterprise to determine its desired direction. The resulting EA is then used to help manage the changes required to achieve the enterprises chosen destination. In a similar manner, Small- and Medium-Sized Enterprises (SMEs) can benefit from EA practices. Achieving these benefits requires EA practices and tools be …


Uncovering Network Perimeter Vulnerabilities In Cisco Routers According To Requirements Defined In Pci Dss 2.0, David E. Naples Jun 2011

Uncovering Network Perimeter Vulnerabilities In Cisco Routers According To Requirements Defined In Pci Dss 2.0, David E. Naples

Regis University Student Publications (comprehensive collection)

According to the Payment Card Industry (PCI), over 500 million records containing sensitive cardholder data have been breached since January 2005. Merchants accepting credit and debit cards are at the center of payment card transactions, making it crucial that standard security procedures and technologies are employed to thwart cardholder data theft. Numerous organizations have experienced embarrassing breaches, which lead to losses of credit card data, including Starbucks, California Pizza Kitchen, and TJX Companies. This paper examined an action research methodology to test the security of a network router and remediate all the vulnerabilities that caused it to fail the requirements …


A Project To Design, Implement, And Populate An Effective Geodatabase In Order To Re-Organize Geographic Information Systems Instructional A Small Community College, James C. Gibbons May 2011

A Project To Design, Implement, And Populate An Effective Geodatabase In Order To Re-Organize Geographic Information Systems Instructional A Small Community College, James C. Gibbons

Regis University Student Publications (comprehensive collection)

Geographic information systems instruction at a small community college was deemed inadequate by instructional staff and students. Inadequate resources and inefficient organization of data resulted in frustration for all users. Slow infrastructure resulted in excessive time needed to complete student projects and precluded the course objectives to be fully met. A project was completed to define requirements and recommendations, obtain necessary upgrades to both hardware and network infrastucture, reorganize data storage in a local geodatabase, and institute methods for more efficient instruction using ArcView and ArcCatalog applications from the software suite ArcGIS Desktop by ESRI. Subsequent adoption of the changes …


Use Of Service Oriented Architecture For Scada Networks, Scott H. Beavers May 2011

Use Of Service Oriented Architecture For Scada Networks, Scott H. Beavers

Regis University Student Publications (comprehensive collection)

Supervisory Control and Data Acquisition (SCADA) systems involve the use of distributed processing to operate geographically dispersed endpoint hardware components. They manage the control networks used to monitor and direct large-scale operations such as utilities and transit systems that are essential to national infrastructure. SCADA industrial control networks (ICNs) have long operated in obscurity and been kept isolated largely through strong physical security. Today, Internet technologies are increasingly being utilized to access control networks, giving rise to a growing concern that they are becoming more vulnerable to attack. Like SCADA, distributed processing is also central to cloud computing or, more …


The Best Nix For A Combined Honeypot Sensor Server, Stephen M. Rodriguez Apr 2011

The Best Nix For A Combined Honeypot Sensor Server, Stephen M. Rodriguez

Regis University Student Publications (comprehensive collection)

The paper will examine (through case-study) the usability of open source operating systems software for a combined Honeypot sensor server. The study will scrutinize the use of two Unix variants, Linux Red Hat and the Sun Solaris operating systems as candidates for deployment of a combined Honeypot sensor server. Appropriate unbiased metrics, such as extensibility, reliability, ease of install and use, will be employed as a likely criterion to evaluate the operating systems for the role of hosting Honeypot sensor server software.


Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett Apr 2011

Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett

Regis University Student Publications (comprehensive collection)

Network security professionals improve confidentiality and integrity of information technology resources when they incorporate encryption schemes into the transmission of network packets across their respective infrastructures. Ironically, network engineers and administrators that incorporate encryption strategies across their infrastructures must simultaneously confront the limitations of end-to-end encrypted network packets inasmuch as they severely impair visible, defensible network architectures. This project demonstrates how security professionals charged with maintaining network visibility can deploy encryption across their topologies without fear of compromising their ability to capture – then fully analyze – network traffic. In so doing, information technology industry practitioners and researchers may confidently …