The analysis of a computer music network and the implementation of essential subsystems
- Authors: Wilks, Antony John
- Date: 1995
- Subjects: Computer networks , Computer music , MIDI (Standard)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4666 , http://hdl.handle.net/10962/d1006682 , Computer networks , Computer music , MIDI (Standard)
- Description: The inability to share resources in commercial and institutional computer music studios results in non-optimal resource utilisation. The use of computers to process, store and communicate data can be extended within these studios, to provide the capability of sharing resources amongst their users. This thesis describes a computer music network which was designed for this purpose. Certain devices had to be custom built for the implementation of the network. The thesis discusses the design and construction of these devices.
- Full Text:
- Date Issued: 1995
- Authors: Wilks, Antony John
- Date: 1995
- Subjects: Computer networks , Computer music , MIDI (Standard)
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4666 , http://hdl.handle.net/10962/d1006682 , Computer networks , Computer music , MIDI (Standard)
- Description: The inability to share resources in commercial and institutional computer music studios results in non-optimal resource utilisation. The use of computers to process, store and communicate data can be extended within these studios, to provide the capability of sharing resources amongst their users. This thesis describes a computer music network which was designed for this purpose. Certain devices had to be custom built for the implementation of the network. The thesis discusses the design and construction of these devices.
- Full Text:
- Date Issued: 1995
The determination of whether a Unified Communication System can be effective in supporting informal communication and collaboration in virtual teams
- Authors: Hill, Kyle
- Date: 2020
- Subjects: Telecommuting , Virtual work teams , Telecommunication systems , Computer networks
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/146343 , vital:38517
- Description: The overall objective of the research is to determine whether a Unified Communication System intervention can be effective in supporting informal communication and collaboration in virtual teams. In so doing, this research is aimed at developing a current framework of critical success factors for facilitating informal collaboration and communication. As teams have evolved to the point where there is no longer a need for team members to be co-located, with a greater importance now being placed on how they collaborate, this framework will also highlight how it can support virtual teams due to the huge potential advantage they can provide to the organisation. A virtual communication and collaboration system will be selected based on the outputs of the current framework and interactions which occur through the system will be observed to provide quantitative and qualitative results. In conclusion, the research will suggest recommendations for the successful implementation of informal communication and collaboration technologies within the organisation. The research will also indicate to a limited degree, the impact of the implementation of these technologies, and the outcome for the organisation, whether positive or negative. Whilst conducting the research, it became apparent that while the UCS was capable of performing the processes and functions required, the individuals and teams engaging with the technology did not always make use of the full scope of the technology provided. Regardless, a UCS was observed to provide direct benefits to an organisation in increasing communication and collaboration in the organisation. These increases can be observed in both the physical and virtual sense. However, the converse is true for generating social capital which lead to the observation that there are a smaller number of interactions happening in the smaller teams, but these are of higher value when compared to the larger teams of this study. It is also clear that the larger a team becomes, the more the trend is to focus on adopting new technologies to make their roles more efficient. This adoption is not however translated into outputs such as social capital but is translated into stronger networks and the formation of new networks. It is also clear that most negative factors around the UCS are related to the respondent’s hardware rather than the solution itself. Cost reductions because of virtuality will also be observed and using the Developed Framework as a blue print, an organisation should be able to observe direct benefits for an organisation by being able to confirm the thesis of this research in that having a UCS intervention is effective in supporting informal communication and collaboration in virtual teams.
- Full Text:
- Date Issued: 2020
- Authors: Hill, Kyle
- Date: 2020
- Subjects: Telecommuting , Virtual work teams , Telecommunication systems , Computer networks
- Language: English
- Type: text , Thesis , Doctoral , PhD
- Identifier: http://hdl.handle.net/10962/146343 , vital:38517
- Description: The overall objective of the research is to determine whether a Unified Communication System intervention can be effective in supporting informal communication and collaboration in virtual teams. In so doing, this research is aimed at developing a current framework of critical success factors for facilitating informal collaboration and communication. As teams have evolved to the point where there is no longer a need for team members to be co-located, with a greater importance now being placed on how they collaborate, this framework will also highlight how it can support virtual teams due to the huge potential advantage they can provide to the organisation. A virtual communication and collaboration system will be selected based on the outputs of the current framework and interactions which occur through the system will be observed to provide quantitative and qualitative results. In conclusion, the research will suggest recommendations for the successful implementation of informal communication and collaboration technologies within the organisation. The research will also indicate to a limited degree, the impact of the implementation of these technologies, and the outcome for the organisation, whether positive or negative. Whilst conducting the research, it became apparent that while the UCS was capable of performing the processes and functions required, the individuals and teams engaging with the technology did not always make use of the full scope of the technology provided. Regardless, a UCS was observed to provide direct benefits to an organisation in increasing communication and collaboration in the organisation. These increases can be observed in both the physical and virtual sense. However, the converse is true for generating social capital which lead to the observation that there are a smaller number of interactions happening in the smaller teams, but these are of higher value when compared to the larger teams of this study. It is also clear that the larger a team becomes, the more the trend is to focus on adopting new technologies to make their roles more efficient. This adoption is not however translated into outputs such as social capital but is translated into stronger networks and the formation of new networks. It is also clear that most negative factors around the UCS are related to the respondent’s hardware rather than the solution itself. Cost reductions because of virtuality will also be observed and using the Developed Framework as a blue print, an organisation should be able to observe direct benefits for an organisation by being able to confirm the thesis of this research in that having a UCS intervention is effective in supporting informal communication and collaboration in virtual teams.
- Full Text:
- Date Issued: 2020
Topic map for representing network security competencies
- Authors: Yekela, Odwa
- Date: 2018
- Subjects: Computer networks , Computer networks -- Security measures Computers -- Access control
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/36368 , vital:33931
- Description: Competencies represent the knowledge, skills and attitudes required for job roles. Organisations need to understand and grow competencies within their workforce in order to be more competitive and to maximise new market opportunities. Competency Management is the process of introducing, managing and enforcing competencies in organisations. Through this process, occupational competencies can be assessed to see if candidates match the required job role expectations. The assessment of competencies can be conceptualised from two perspectives. The rst is `competency frameworks', which describe competencies from a high-level overview. As such, they are regarded as theWhat" element of competency. The second perspective is `competencybased learning', which focuses on addressing competencies from a more detailed, task-oriented perspective. Competency-based learning is regarded as the How" element of competency. Currently, there is no available tool that can map the What" with the How" element of competency. Such a mapping would provide a more holistic approach to representing competencies. This dissertation adopts the topic map standard in order to demonstrate a holistic approach to mapping competencies, specially in network security. This is accomplished through the design and evaluation of a Design Science artefact. In this research process a topic map data model was constructed from mapping the `What' and `How' elements together. To demonstrate the applicability of the model, it was implemented in a Computer Security Incident Response Team (CSIRT) recruitment scenario. The aim of this demonstration was to prove that the topic map could be implemented in an organisational context.
- Full Text:
- Date Issued: 2018
- Authors: Yekela, Odwa
- Date: 2018
- Subjects: Computer networks , Computer networks -- Security measures Computers -- Access control
- Language: English
- Type: Thesis , Masters , MIT
- Identifier: http://hdl.handle.net/10948/36368 , vital:33931
- Description: Competencies represent the knowledge, skills and attitudes required for job roles. Organisations need to understand and grow competencies within their workforce in order to be more competitive and to maximise new market opportunities. Competency Management is the process of introducing, managing and enforcing competencies in organisations. Through this process, occupational competencies can be assessed to see if candidates match the required job role expectations. The assessment of competencies can be conceptualised from two perspectives. The rst is `competency frameworks', which describe competencies from a high-level overview. As such, they are regarded as theWhat" element of competency. The second perspective is `competencybased learning', which focuses on addressing competencies from a more detailed, task-oriented perspective. Competency-based learning is regarded as the How" element of competency. Currently, there is no available tool that can map the What" with the How" element of competency. Such a mapping would provide a more holistic approach to representing competencies. This dissertation adopts the topic map standard in order to demonstrate a holistic approach to mapping competencies, specially in network security. This is accomplished through the design and evaluation of a Design Science artefact. In this research process a topic map data model was constructed from mapping the `What' and `How' elements together. To demonstrate the applicability of the model, it was implemented in a Computer Security Incident Response Team (CSIRT) recruitment scenario. The aim of this demonstration was to prove that the topic map could be implemented in an organisational context.
- Full Text:
- Date Issued: 2018
Using semantic knowledge to improve compression on log files
- Authors: Otten, Frederick John
- Date: 2009 , 2008-11-19
- Subjects: Computer networks , Data compression (Computer science) , Semantics--Data processing
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4650 , http://hdl.handle.net/10962/d1006619 , Computer networks , Data compression (Computer science) , Semantics--Data processing
- Description: With the move towards global and multi-national companies, information technology infrastructure requirements are increasing. As the size of these computer networks increases, it becomes more and more difficult to monitor, control, and secure them. Networks consist of a number of diverse devices, sensors, and gateways which are often spread over large geographical areas. Each of these devices produce log files which need to be analysed and monitored to provide network security and satisfy regulations. Data compression programs such as gzip and bzip2 are commonly used to reduce the quantity of data for archival purposes after the log files have been rotated. However, there are many other compression programs which exist - each with their own advantages and disadvantages. These programs each use a different amount of memory and take different compression and decompression times to achieve different compression ratios. System log files also contain redundancy which is not necessarily exploited by standard compression programs. Log messages usually use a similar format with a defined syntax. In the log files, all the ASCII characters are not used and the messages contain certain "phrases" which often repeated. This thesis investigates the use of compression as a means of data reduction and how the use of semantic knowledge can improve data compression (also applying results to different scenarios that can occur in a distributed computing environment). It presents the results of a series of tests performed on different log files. It also examines the semantic knowledge which exists in maillog files and how it can be exploited to improve the compression results. The results from a series of text preprocessors which exploit this knowledge are presented and evaluated. These preprocessors include: one which replaces the timestamps and IP addresses with their binary equivalents and one which replaces words from a dictionary with unused ASCII characters. In this thesis, data compression is shown to be an effective method of data reduction producing up to 98 percent reduction in filesize on a corpus of log files. The use of preprocessors which exploit semantic knowledge results in up to 56 percent improvement in overall compression time and up to 32 percent reduction in compressed size. , TeX , pdfTeX-1.40.3
- Full Text:
- Date Issued: 2009
- Authors: Otten, Frederick John
- Date: 2009 , 2008-11-19
- Subjects: Computer networks , Data compression (Computer science) , Semantics--Data processing
- Language: English
- Type: Thesis , Masters , MSc
- Identifier: vital:4650 , http://hdl.handle.net/10962/d1006619 , Computer networks , Data compression (Computer science) , Semantics--Data processing
- Description: With the move towards global and multi-national companies, information technology infrastructure requirements are increasing. As the size of these computer networks increases, it becomes more and more difficult to monitor, control, and secure them. Networks consist of a number of diverse devices, sensors, and gateways which are often spread over large geographical areas. Each of these devices produce log files which need to be analysed and monitored to provide network security and satisfy regulations. Data compression programs such as gzip and bzip2 are commonly used to reduce the quantity of data for archival purposes after the log files have been rotated. However, there are many other compression programs which exist - each with their own advantages and disadvantages. These programs each use a different amount of memory and take different compression and decompression times to achieve different compression ratios. System log files also contain redundancy which is not necessarily exploited by standard compression programs. Log messages usually use a similar format with a defined syntax. In the log files, all the ASCII characters are not used and the messages contain certain "phrases" which often repeated. This thesis investigates the use of compression as a means of data reduction and how the use of semantic knowledge can improve data compression (also applying results to different scenarios that can occur in a distributed computing environment). It presents the results of a series of tests performed on different log files. It also examines the semantic knowledge which exists in maillog files and how it can be exploited to improve the compression results. The results from a series of text preprocessors which exploit this knowledge are presented and evaluated. These preprocessors include: one which replaces the timestamps and IP addresses with their binary equivalents and one which replaces words from a dictionary with unused ASCII characters. In this thesis, data compression is shown to be an effective method of data reduction producing up to 98 percent reduction in filesize on a corpus of log files. The use of preprocessors which exploit semantic knowledge results in up to 56 percent improvement in overall compression time and up to 32 percent reduction in compressed size. , TeX , pdfTeX-1.40.3
- Full Text:
- Date Issued: 2009