National Repository of Grey Literature 22 records found  1 - 10nextend  jump to record: Search took 0.00 seconds. 
Evaluation of the Financial Situation in the Firm and Proposals to its Improvement
Balada, Matěj ; Balada, Jakub (referee) ; Solař, Jan (advisor)
This B.A. thesis is focused on the financial evaluation of the CONSTRUCT A&D a.s. company for the 2005 – 2008 period, based on the financial analysis indicators. In this thesis, we will also deal with the information system used in the company. Based on the given analysis, the improvements of the company’s current situation and its information system will be proposed.
Centralized management of user access rights in large organizations with heterogeneous structure
Balada, Jakub ; Vohnoutová, Marta (advisor) ; Beneš, Antonín (referee)
Each platform, a database, a group of applications etc. have its own management, its own user list and list of user rights, its own security policy and so on. The administration is demanding, application control and data access make demands both on system administrators, data owners, and common users. This situation is not suitable even for a general security policy of an organization. That is why the Identity and Access Management is implemented. The Identity Management solves a central user management including their user roles. User accounts as well as other user information in subordinate systems and applications are created, modified and deleted exclusively through the Identity Management. On the other hand, the Access Management is the single source of information about user access rights for systems and applications. This diploma thesis describes in detail a system of hierarchy of user access rights, a way, particular user access rights are approved, and a way of their activations. The solution described, is a part of a real large project made for a big state authority.
Centralized management of user access rights in large organizations with heterogeneous structure
Balada, Jakub ; Vohnoutová, Marta (advisor) ; Beneš, Antonín (referee)
Each platform, a database, a group of applications etc. have its own management, its own user list and list of user rights, its own security policy and so on. The administration is demanding, application control and data access make demands both on system administrators, data owners, and common users. This situation is not suitable even for a general security policy of an organization. That is why the Identity and Access Management is implemented. The Identity Management solves a central user management including their user roles. User accounts as well as other user information in subordinate systems and applications are created, modified and deleted exclusively through the Identity Management. On the other hand, the Access Management is the single source of information about user access rights for systems and applications. This diploma thesis describes in detail a system of hierarchy of user access rights, a way, particular user access rights are approved, and a way of their activations. The solution described, is a part of a real large project made for a big state authority.
Evaluation of the Financial Situation in the Firm and Proposals to its Improvement
Balada, Matěj ; Balada, Jakub (referee) ; Solař, Jan (advisor)
This B.A. thesis is focused on the financial evaluation of the CONSTRUCT A&D a.s. company for the 2005 – 2008 period, based on the financial analysis indicators. In this thesis, we will also deal with the information system used in the company. Based on the given analysis, the improvements of the company’s current situation and its information system will be proposed.
Agile methodologies in complex environment
Balada, Jakub ; Buchalcevová, Alena (advisor) ; Pitner, Tomáš (referee) ; Antlová, Klára (referee)
Only a small number of projects of information system development succeed. Agile methodologies have contributed to a higher level of success of specific projects developed by small teams. Nevertheless, most IT companies still refuse this approach with large-scale projects. This paper comments on the conditions that must be fulfilled for agile adoption, analyzes the limitation of such processes, and describes the approaches for the solutions of such problems with the focus on projects in a complex environment. By means of a case study, the next part of the paper shows the advantages of adopting an agile approach in a real project in a complex environment, which is in conflict with the so far presented limitations of this methodology. The project was evaluated as a success, primary, due to the implementation of the agile methodology during the development phase. This implementation helped meet all the project deadlines, accelerate bug-fixing, and especially deliver functionalities which brought an additional value to the customer. Based on the findings of the case study, the procedures and practices extending the chosen agile methodology are defined. Such procedures and practices can be used in other projects in complex environments in the future. Thus, the paper shows more options for the use of these methodologies, which may help its wider use in the future and hence increasing the success of projects focused on the development of information systems. Such situation would lead to an effective interconnectedness of ICT and business strategies, especially due to the flexible delivery of currently needed ICT services.
Methods of users autentization in IS
Nazaryan, Armen ; Balada, Jakub (advisor) ; Buchalcevová, Alena (referee)
The Objectives were it to inform the work of outsider Even Slightly hip readers of information technology to the Characteristics of authentication technologies, Their Advantages and disadvantages of a Retrospective Comparison of Methods of logging. Paper outlines the Implementation Process and describes its examples. The Practical Part of the Imperfection of Technology Shows Some errors and biometric security Methods. The structure of work is Divided Into 4 Basic Headings, ergot, authentication methods, Basic Characteristics of names and passwords, and Their proper use, and the Implementation Process and Practical part, the two WHERE Attempts to break the biometric security. Both Attempts were also we Contribution on Methods of authentication. The experience I gained Valuable during Their Performance In the future I definitely has more efforts to keep sensitive data and Forms of Access, The Greatest caution.
The use of social CRM in companies
Vitásek, Tomáš ; Basl, Josef (advisor) ; Balada, Jakub (referee)
Submitted diploma thesis puts a target to analyze current state of using customer relationship management systems in small or mid-size companies located in Czech Republic. Second main goal of this work is (based on the historical development business information systems) characterize and describe changes of approach from classic CRM systems to Social CRM and usage of this social networks as new channel and space for business. There will be questionnaire base on the theoretical part of the thesis, which will be distributed to the Czech companies in the informatics industry. Results of this questionnaire will then show the current status of CRM and the connection to the social networks together with the possible ways of progress to the future. As well there will be described basic options for business pages on social networking site Facebook, and how easy it is to create such a profile.
The Benefits of Identity and Access Management
Strachota, Marek ; Balada, Jakub (advisor) ; Buchalcevová, Alena (referee)
This thesis defines and verifies the benefits of Identity and Access management systems that firms and institutions make use of. The first part contains an examination of the very basic principles of Identity and Access management. This is where the characteristic features are described and their advantages and disadvantages valued. The last part sums up and comments all the advantages, drawbacks and possible risks, while a certain set of metrics are recommended. The following part describes the most important firms on the Identity and Access management market and their own products. Trends and market situation is examined. The practical part focuses on the real benefits of Identity and Access management solutions when used in a chosen firm. The situation before and after upgrading a certain Identity and Access management solution in a selected firm is observed and the benefits and shortcomings are evaluated. The outcome of this thesis is to confirm both theoretical and practical expectations and considerations of Identity and Access management solutions in a real life situation.
Lean software development
Hefnerová, Lucie ; Buchalcevová, Alena (advisor) ; Balada, Jakub (referee)
The main goal of this bachelor thesis is the emergence of the clear Czech written material concerning the concept of Lean Software Development, which has been gaining significant attention in the field of software development, recently. Another goal of this thesis is to summarize the possible approaches of categorizing the concept and to summarize the possible approaches of defining the relationship between Lean and Agile software development. The detailed categorization of the tools potentially usable to support the principles is also covered. First chapters are written for the introductory purposes of the context of the concept of Lean Software Development -- the main approaches in the field of software development, history of the concept and Lean thinking are covered. Then, the main characteristics, categorization, schools of thought and principles of the concept are described. Following chapter deals with the both description and categorization of the tools usable to support the concept's principles. Finally, the advantages, disadvantages and real cases of the usage of Lean Software Development are introduced.
Scaling of agile methodologies
Zikmund, Jan ; Buchalcevová, Alena (advisor) ; Balada, Jakub (referee)
Agile methodologies have become a routine part of software development. Despite their initial focus on small and local teams working on relatively simple applications, the current trend is their application to development of large and complex systems. This work provides a general introduction to agile methodologies, including the extent of their use in practice, limitations of these methods together with the introduction of the concept of scaling. The work is then devoted to starting points and the general approaches to scaling. In conclu-sion, the practical part of the work proposes methodology for evaluating performance of agile methodologies in projects. The aim is to provide an overview of agile methodologies and subsequently particularly analyze soft, organizational problems that are related to scaling agile methodologies. This work can serve as tool for management, or project office when considering adoption of agile methods.

National Repository of Grey Literature : 22 records found   1 - 10nextend  jump to record:
See also: similar author names
2 Balada, Josef
Interested in being notified about new results for this query?
Subscribe to the RSS feed.