Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Rcon Administration Tool Designed For Use With Garry’S Mod And Source Servers, John Gibbons May 2018

Rcon Administration Tool Designed For Use With Garry’S Mod And Source Servers, John Gibbons

Mathematics and Computer Science Capstones

The proposed project is an Android application designed to interact with the Source RCON protocol. Defined below: The Source RCON Protocol is a TCP/IP-based communication protocol used by Source Dedicated Server, which allows console commands to be issued to the server via a "remote console", or RCON. The most common use of RCON is to allow server owners to control their game servers without direct access to the machine the server is running on. In order for commands to be accepted, the connection must first be authenticated using the server's RCON password, which can be set using the console variablercon_password.


Zuca Words, Lancelot Jeff-Macauley Jr. Jan 2017

Zuca Words, Lancelot Jeff-Macauley Jr.

Mathematics and Computer Science Capstones

A small educational website geared towards helping Kindergarten students practice their sight words through a few fun online games.


Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly Nov 2016

Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly

HON499 projects

The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information includes …


Findapark Implementation, David Laratta May 2016

Findapark Implementation, David Laratta

Mathematics and Computer Science Capstones

FindAPark is a web service application designed to help a user search for a local hike or vacation revolving around hiking or cycling. Workplan The workplan for this capstone is to create the System Proposal which includes detailed information about the completion of all the items in the System Proposal except the Functional, Structural, and Behavioral Models.


Analyzing Blackboard: Using A Learning Management System From The Student Perspective, Jennifer Squillante, Lekia Wise, Thomas Hartey May 2014

Analyzing Blackboard: Using A Learning Management System From The Student Perspective, Jennifer Squillante, Lekia Wise, Thomas Hartey

Mathematics and Computer Science Capstones

This report was provided to gain insight into the student perspective on how students interact with their current Learning Management System (LMS), Blackboard. It is currently used to house course content for La Salle’s traditional, online, and hybrid (combination of traditional and online sessions) courses. The university is currently investigating on whether or not there are advantages to switching to an alternate LMS and wanted to gather information on the current student opinion of the tool.

The research shows that La Salle’s student population did not favor one LMS tool over another but the research did show which features were …


Strategically Addressing The Latest Challenges Of Workplace Mobility To Meet The Increasing Mobile Usage Demands, Shweta Somalwar, Loc Nguyen Jan 2014

Strategically Addressing The Latest Challenges Of Workplace Mobility To Meet The Increasing Mobile Usage Demands, Shweta Somalwar, Loc Nguyen

Mathematics and Computer Science Capstones

During this post-PC era, many organizations are embracing the concept of IT consumerization/ Bring-Your-Own Device (BYOD) in their workplace. BYOD is a strategy that enables employees to utilize their personally-owned mobile devices, such as smart phones, tablets, laptops, and netbooks, to connect to the corporate network and access enterprise data. It is estimated that employees will bring two to four Internet-capable devices to work for personal and professional activities. From increased employee satisfaction and productivity to lower IT equipment and operational expenditures, companies have recognized that mobile devices are reasonably essential to their own success.

However, many organizations are facing …


Consumerization Of It, Thomas Stagliano, Anthony Dipoalo, Patricia Coonelly Jan 2013

Consumerization Of It, Thomas Stagliano, Anthony Dipoalo, Patricia Coonelly

Mathematics and Computer Science Capstones

The consumerization of information technology is one of the biggest trends occurring in the information technology (IT) industry. More organizations are allowing their employees to use their own mobile devices to share data both inside and outside the workplace. This new trend is fundamentally changing the way companies do business. The “Bring Your Own Device” (BYOD) trend is also driving a need for management of such mobile devices and greater security on the devices and for the employees. The consumerization of IT is well underway and it is more than just bringing an iPad into the office.

Many IT managers …