TCC - Bacharelado em Ciência da Computação (Sede)

URI permanente para esta coleçãohttps://arandu.ufrpe.br/handle/123456789/415

Navegar

Resultados da Pesquisa

Agora exibindo 1 - 5 de 5
  • Imagem de Miniatura
    Item
    Desenvolvimento de no-code no FlowUp: construção de campos personalizáveis
    (2024-10-04) Santos, João Victor Vieira Silva dos; Monteiro, Cleviton Vinicius Fonsêca; http://lattes.cnpq.br/9362573782715504; http://lattes.cnpq.br/5366897410770757
    This study focuses on the implementation of No-Code features in the FlowUp ERP system to provide greater flexibility and customization for users. Using the Design Thinking methodology, customizable fields were developed, allowing for better adaptation of the system to the specific needs of each company. Interviews with stakeholders confirmed the usefulness of the feature, suggesting improvements for its expansion. The study concludes that the introduction of No-Code in FlowUp is an efficient solution for customization, offering new possibilities for system evolution and data integration.
  • Imagem de Miniatura
    Item
    Comparação de VPN e ZTNA: uma análise de segurança e desempenho em ambientes corporativo
    (2024-09-30) Chagas, Marcelino Francisco Gomes das; Medeiros, Robson Wagner Albuquerque de; http://lattes.cnpq.br/3169193612606500
    Constant technological advances and the rapid expansion of infrastructures in public cloud providers have created significant challenges for companies, especially with regard to information security. Traditional security measures, such as Virtual Private Networks (VPNs), which create a secure tunnel for data transmission between the user and the corporate network, are not always adequate to protect data in cloud environments, resulting in a growing need to re-evaluate protection strategies. The COVID-19 pandemic has further intensified this demand, as organizations have been forced to adopt remote working practices on a large scale. In this scenario, trust in the final data has become a critical concern, especially given the limitations of traditional VPN solutions. In response to these challenges, Zero Trust Architecture (ZTA) and Zero Trust Network Access (ZTNA) have emerged as promising approaches. ZTNA is a technology based on the principles of ZTA that redefines network access control by eliminating implicit trust in any user or device, regardless of their location, and requiring continuous verification for every access attempt. This approach offers more granular security at the network and access control level, and is adaptable in on-premise and cloud environments, protecting data in distributed and constantly evolving corporate environments. The aim of this work is to carry out a comparative analysis of VPN and ZTNA network technologies, with an emphasis on evaluating security and performance. The security features offered by each technology will be examined, including authentication, access control and encryption, as well as the impact of these technologies on network performance in terms of latency, bandwidth and response time. Through this analysis, we aim to identify the advantages and disadvantages of each technological approach, offering valuable insights for IT professionals and organizations in selecting and implementing the solution best suited to their security and performance needs in modern corporate environments.
  • Imagem de Miniatura
    Item
    Analisando a presença feminina no Ensino Superior em Tecnologia no Brasil ao longo dos anos de 2013 a 2022
    (2024-03-07) Ramos, Giuliane Benjamim de Oliveira; Alencar, Andrêza Leite de; Furtado, Ana Paula Carvalho Cavalcanti; http://lattes.cnpq.br/5862330768739698; http://lattes.cnpq.br/6060587704569605; http://lattes.cnpq.br/6421196285147828
    Masculine stigma, low family encouragement, and lack of representation are the main factors that justify the underrepresentation of women in the technology field. Therefore, this paper aims to highlight the current female landscape in Information Technology (IT) higher education courses in Brazil. To achieve this purpose, a literature review and analysis of microdata from the Higher Education Census from 2013 to 2022, provided by the National Institute for Educational Studies and Research An´ısio Teixeira (INEP), were conducted. The analysis shows significantly low female representation in higher education technology courses over the analyzed period - female enrollments do not exceed 17%, the completion rate averages 15%, and the Southeast region has the highest number of female representatives in IT courses, with São Paulo standing out. However, a trend of increase can be observed in the last two years.
  • Imagem de Miniatura
    Item
    Avaliação experimental de replicação em banco de dados para recuperação de desastres
    (2020-12-18) Santos Neto, Wilson Medeiros dos; Andrade, Ermeson Carneiro de; http://lattes.cnpq.br/2466077615273972; http://lattes.cnpq.br/1208163441814364
    IT systems are essential for the operations of any modern business. Such systems must support operations of their corresponding company under any conditions. Disaster Recovery (DR) strategies have been implemented to help organizations mitigate unexpected failures and reduce unnecessary expenses. However, to the best of our knowledge, no other work experimentally analyzes data replication at the database layer with a focus on DR strategies. Therefore, this work evaluates a relational database replication as a mean of implementing a DR solution. We use a real testbed in a public cloud environment to perform extensive experiments aimed at implementing the replication provided by MySQL, considering various scenarios in the context of DR. Our results show how response time, Recovery Point Objective (RPO) and Recovery Time Objective (RTO) vary according to the size of the replicated data, the synchronization type (ex.: asynchronous or semisynchronous) and the configuration of the slave servers. This work can assist DR coordinators or individuals to decide which database replication configuration for disaster recovery is best for their work environment.
  • Imagem de Miniatura
    Item
    Um guia para organização de hackathons corporativos no contexto de inovação
    (2020-10-27) Oliveira, Nycolas Lacerda de; Santos, George Augusto Valença; http://lattes.cnpq.br/8525564952779211; http://lattes.cnpq.br/9735432226857557
    Hackathons have become a worldwide innovation phenomenon thanks to a paradigm shift. From events focused on solving system bugs, they came to be perceived as a strategy for open innovation in small to large organizations, such as Uber and Facebook. When promoted by private companies, they are known as corporate hackathons, with key business activities as the object of analysis by the participants. Organizing a corporate hackathon is not a trivial process, considering issues such as the type of audience to be involved, the duration of the event or the technologies and challenges to be presented. Motivated by this scenario, we carry out a systematic mapping to identify the process of corporate hackathons (pre-hackathon, hackathon and post-hackathon) as well as its main characteristics (objectives, participants, duration, location and application domain) based on a set of 29 primary articles. At the end, we conducted a review by experts, with participants and hackathon organizers to interpret our findings and raise adjustment needs. In this way, our main contribution is to propose a guide for organizing corporate hackathons extracted from the literature and later enriched with the expert’s view.