scholarly journals System Administrator Training Item #25928

2021 ◽  
Author(s):  
Helen Rinke
Author(s):  
Anshika Srivastava ◽  
Anjali Baranwal

Abstract— Restaurants are one of the favorite premises .An online food ordering is a integrated process in fast food Restaurants to offer choice of food from menu, cooked and served or packaged hot to satisfy customer  to immediately make orders on their ownselves. Customers can also call the restaurant to pack in advance or to  deliver the food item but sometimes restaurants run out of certain items.The existing system lacks the feature to use Remote GPS tracker such that restaurant managers are auto updated about the location of the customer before reaching the restaurant. We propose a complete system to easily manage online menu where items update as per the availability of food and prices. The Customer views the products, register and place the order. The system administrator adds and manages user accounts and the Manager manages product and orders. The Kitchen meal deliverable deals with pending deliveries .The proposed system is developed using Android platform which is open source software and built in data connection modules. It also decreases labour rates to replace mobile phones to book order and table unlike employees who come to take order and payments .In advent of food consumption problems like obesity, overeating etc. ,he proposed system will show food items with nutrition based searches showing ingredients of the food items.


2018 ◽  
Vol 8 (11) ◽  
pp. 2305 ◽  
Author(s):  
S Rana ◽  
Miah Halim ◽  
M. Kabir

Internet of Things (IoT) opens new horizons by enabling automated procedures without human interaction using IP connectivity. IoT deals with devices, called things, represented as any items from our daily life that are enhanced with computing or communication facilities. Among various mobile communications, Zigbee communication is broadly used in controlling or monitoring applications due to its low data rate and low power consumption. Securing IoT systems has been the main concern for the research community. In this paper, different security threats of Zigbee networks in the IoT platform have been addressed to predict the potential security threats of Zigbee protocol and a Security Improvement Framework (SIF) has been designed for intelligent monitoring in an office/corporate environment. Our proposed SIF can predict and protect against various potential malicious attacks in the Zigbee network and respond accordingly through a notification to the system administrator. This framework (SIF) is designed to make automated decisions immediately based on real-time data which are defined by the system administrator. Finally, the designed SIF has been implemented in an office security system as a case study for real-time monitoring. This office security system is evaluated based on the capacity of detecting potential security attacks. The evaluation results show that the proposed SIF is capable of detecting and protecting against several potential security attacks efficiently, enabling a more secure way of intelligent monitoring in the IoT platform.


Author(s):  
Weidong Yang ◽  
Hao Zhu

In this chapter, firstly, the LCA-based approaches for XML keyword search are analyzed and compared with each other. Several fundamental flaws of LCA-based models are explored, of which, the most important one is that the search results are eternally determined nonadjustable. Then, the chapter presents a system of adaptive keyword search in XML, called AdaptiveXKS, which employs a novel and flexible result model for avoiding these defects. Within the new model, a scoring function is presented to judge the quality of each result, and the considered metrics of evaluating results are weighted and can be updated as needed. Through the interface, the system administrator or the users can adjust some parameters according to their search intentions. One of three searching algorithms could also be chosen freely in order to catch specific querying requirements. Section 1 describes the Introduction and motivation. Section 2 defines the result model. In section 3 the scoring function is discussed deeply. Section 4 presents the system implementation and gives the detailed keyword search algorithms. Section 5 presents the experiments. Section 6 is the related work. Section 7 is the conclusion of this chapter.


Author(s):  
Josh More ◽  
Anthony J. Stieber ◽  
Chris Liu
Keyword(s):  
Tier 1 ◽  

2020 ◽  
Vol 10 (1) ◽  
pp. 25-32
Author(s):  
Harun Mukhtar ◽  
Daniel Adi Putra Sitorus ◽  
Yulia Fatma

Mail server is one of the most widely used server functions in the company. This discusses e-mail itself which can reduce mailing costs, is more efficient than manual communication and can be used as attachments that are useful as a supplement and additional documents related to the contents of e-mail. Zimbra is a mail server application that provides complete features and also makes it easy to install mail server management, also mail server security issues are a factor that must be considered by the system administrator. The security design for e-mail servers addresses the importance of being able to prevent spam e-mail attacks that can fill e-mail servers and make mail server performance faster. Because a good mail server security can optimize the performance of the mail server itself. In this final project, the work and implementation of the zimbra mail server security will be carried out specifically for handling email spam. The zimbra email server will analyze its security against spam email attacks, so that it can function as an email server on the company.


1993 ◽  
Vol 3 (6) ◽  
pp. 666-678
Author(s):  
Maria M. Shelton ◽  
Jerry J. Herman

Countless school administrators will soon be retiring, and as a result, school systems must proactively help novice administrators quickly “learn the ropes.” Two ways to assist novices are: (1) mentoring, and (2) shadow consulting. Mentoring entails coupling a respected, experienced administrator with the novice and moving the novice to higher levels of productivity and effectiveness. Shadow consulting places a shadow consultant with the novice who monitors the individual's daily routine, provides the individual with performance feedback, and helps the individual develop a personal improvement plan. Mentoring and shadow consulting are excellent vehicles for “bringing novices on board” and “improving veteran administrators’ skills.”


2004 ◽  
Vol 3 (2-3) ◽  
pp. 89-108 ◽  
Author(s):  
Jennifer E. Cross ◽  
Rebecca Newman-Gonchar

2010 ◽  
Vol 129-131 ◽  
pp. 670-674
Author(s):  
Xu Jing ◽  
Dong Jian He ◽  
Lin Sen Zan ◽  
Jian Liang Li ◽  
Wang Yao

In management-type SaaS, user must be permitted to submit tenant’s business data on the SP's server, which may be embedded by the web-based malware. In this paper, we propose the automatic detecting method of web-based malware based on behavior analysis, which can make sure to meet the SLA by detecting the web-based malware actively. First, tenant’s update is downloaded to the bastion host by the web crawler. Second, it detect the behavior that tenant’s update is opened by IE. In order to break the malicious behavior during detecting, the IE has been injected in the DLL. Last, if the sensitive operations happen, the URL is appended to the malicious address database, and at same time the system administrator is informed by the SMS. The result of test is shown that our method can detect the web-based malware accurately. It helps to improve the service level of the management-type SaaS.


Sign in / Sign up

Export Citation Format

Share Document