|
Information System Selection
Gurka, David ; Viktorin, Ondřej (referee) ; Dydowicz, Petr (advisor)
This master’s thesis deals with selection of optimal information system for medium sized engineering company. Decision to implement a new ERP system is a big step forvard and the main target of this thesis is to make the best possible recommendation how to proceed in this task. Main solution is a new ERP system for this company with economic evaluation and important benefits of this system.
|
|
Use VBA as a Tool for the Creation of Supporting Business Applications
Märtzová, Alexandra ; Neuwirth, Bernard (referee) ; Dydowicz, Petr (advisor)
The bachelor thesis focuses its goal on description and implementation of the information system application of the organisation financed by the state budget. After analysing the existing information system, change recommendations were proposed, that meet the norms, standards, and organisation requirements. Subsequently, the recommendations were implemented into application suggestion. The solution aim to automate data storage and search processes, transform related data into visual presentation, and thus reduce the length time of customer service.
|
| |
| |
| |
| |
| |
|
Proposal for Changes in the Company Information System
Keclík, David ; Neuwirth, Bernard (referee) ; Dydowicz, Petr (advisor)
The main aim of this diploma thesis is to propose for changes in the company information system. Document content is focuse on analyse, implementation and using data warehouse and usage advance to optimaze methods for achievement added value to users. The first part of this thesis is focused on choice of suitable concept of data warehouse, implementation and possible problems. In the second part, I compare assets of this system with costs for development and administration.
|
| |
|
Design and Creation of Proxy for Penetration Testing
Válka, Michal ; Bláha, Lukáš (referee) ; Dydowicz, Petr (advisor)
This bachelor’s thesis is aimed at design and development of proxy for penetration testing. The thesis is divided into three main parts and begins with a theoretical part, which is focused on fundamental technologies and principles on which the application is based. The second part is focused on comparison of currently available solutions. The third part contains the creation of the proxy itself. The last chapter contains a summary of this thesis and the benefits of the developed product for penetration testing.
|