National Repository of Grey Literature 30 records found  beginprevious21 - 30  jump to record: Search took 0.01 seconds. 
Business Plan
Vidlák, Jiří ; Škoda, Martin (referee) ; Hanušová, Helena (advisor)
This bachelor’s thesis deals with business plan, which will focus on the creation of the company in the timber industry. The company will be founded as a small to medium enterprise and we will try to work on its functioning. In conclusion, the company should make a profit.
Bussines Plan
Škoda, Martin ; Pavel, Lukáš (referee) ; Pavláková Dočekalová, Marie (advisor)
The main objective of bachelor thesis is business plan elaboration for e sport bar establishment in Brno city. Theoretical part is focused on defining basic concepts of businesses. Information from theoretical part is used in practical part. Practical part is focused on analysis of market and business environment. For purpose of research in communities with potential customers the survey was made. Business plan proposal is based on the information from previous work. Results of the research and evaluation of feasibility are described in conclusion.
Securing Shared Data Storage
Škoda, Martin ; Hajný, Jan (referee) ; Malina, Lukáš (advisor)
This work presents the cloud computing model. It describes deployment models and distribution models of the cloud computing. The distribution models like software as a service and infrastructure as a service are described. Then the current solutions from companies Amazon.com, Microsoft and VMware and the description of security of the particular solutions are presented. The next section deals with data security in the cloud computing. In this section, the fundamental methods of data security (confidentiality, integrity and availability) and the examples of cryptographic methods used in the cloud computing are described. Further, the methods used for secure infrastructure and network (defense in depth), the protection of privacy and the security of data storage are described. Nowadays, the open problems are ensuring the protection of privacy of user data and data storage security auditing, which prevent users to gain trust in cloud computing. To solve these problems, Privacy as a Service (PasS), homomorphic encryption, privacy preserving data storage public auditing and Trusted Computing are described. In the final part of this work, the threads in the cloud computing environment and theirs countermeasures are analyzed. Finally, the design of model for securing shared data storage is proposed. Model is based on the previous findings. Model uses a tamper-proof hardware with cryptographic protections to ensure the privacy of computed data and the integrity of data stored on storage in the cloud computing.
Antenna design for ULF- Low-level magnetic measurements
Škoda, Martin ; Kříž, Tomáš (referee) ; Fiala, Pavel (advisor)
The present work deals with the design and study of the sensing element (antenna) for ultra low level measurements of low frequency magnetic fields. At the first, it considers the propagation of electromagnetic fields and form of propagation of electromagnetic waves. Then, using Ansys Maxwell are simulated by three models sensing elements. At the end of thesis, two antennas are implemented and conducted laboratory measurements with them.
Implementation of symmetric bloc cipher AES in modern processors
Škoda, Martin ; Balík, Miroslav (referee) ; Rášo, Ondřej (advisor)
The main aim of master's thesis is usage of new instructions from instruction set called Intel® Advanced Encryption Standard New Instructions (AES-NI), which is available on processors with code name Westmere and newer. In theoretical part, there are described symmetric block ciphers and their operational modes. Cipher AES is described in details, especially used block transformations, key expansion and equivalent inverse cipher. Next topic is description of instructions of AES-NI instruction set – their function is explained using pseudo codes of instructions and there are examples of their usage in code. Further in work, dynamic-link library is created, which implements cipher AES with key sizes 128, 192 and 256 bites and implements operational modes described in theoretical part. Library functions are called from Matlab by scripts and their functionality is proved by checking test vectors values, which are provided in publications of National Institute of Standards and Technology.
Concrete ceiling over stage
Škoda, Martin ; Šimůnek, Petr (referee) ; Perla, Jan (advisor)
The work focuses on the design and assessment monolothic reinforced concrete beamed ceiling. All calculations are done in accordance with Eurocode 2.
Factors influencing successful advertising in FMCG
Škoda, Martin ; Postler, Milan (advisor) ; Vysekalová, Jitka (referee)
Diploma thesis focuses on main forms of ATL and BTL communication and describes the most important factors of creating a successful ad-campaign. It's importance is ilustrated on three real examples.
Business plan - proposal containing a strategy of Centrum FotoŠkoda
Škoda, Martin ; Křížek, Miroslav (advisor) ; Kešner, Martin (referee)
The works shows aplication of business plan and other theoretical basis on an individual example of a firm Centrum FotoŠkoda. All recommendations help the managers to make the right decisions.
Analýza a postavení firmy jako podklad strategického rozhodování
Škoda, Martin ; Černá, Jitka (advisor)
Bakalářská práce analyzuje firmu Centrum FotoŠkoda. Práce charakterizuje klíčové faktory, které definují hlavní cíl práce - určení strategie firmy. Vychází z analýzy mikrookolí a makrookolí, přičemž vyzužívá metod PEST a Porterův model 5 sil. Dále vychází z analýzy vznitřních zdrojů firmy. Výsledná syntéza obou analýz je základem pro formulování strategie. Závěrem práce uvádí doporučení ke stávájící strategii firmy.
Manipulation and influence of media
Škoda, Martin ; Hubinková, Zuzana (advisor) ; Jarošová, Eva (referee)
Práce se zabývá vlivem médií na člověka. Zahrnuje vybrané prostředky, kterých média často využívají k polarizování jedince - od barevné a tvarové symboliky, přes řeč těla a akustické ovlivňování, až po impulzy pod prahem lidského vnímání. Rovněž shrnuje stručnou historii vybraných médií a epoch lidské komunikace. Následně popisuje nejčastěji se vyskytující formy propagandy a manipulace. Praktická část poté pomocí experimentálního dotazníkového šetření nastiňuje, jak je ve skutečnosti snadné člověka zmanipulovat, aniž by si to uvědomoval.

National Repository of Grey Literature : 30 records found   beginprevious21 - 30  jump to record:
See also: similar author names
3 ŠKODA, Miroslav
6 Škoda, Marek
4 Škoda, Michael
12 Škoda, Michal
2 Škoda, Milan
Interested in being notified about new results for this query?
Subscribe to the RSS feed.