TCC - Bacharelado em Ciência da Computação (Sede)
URI permanente para esta coleçãohttps://arandu.ufrpe.br/handle/123456789/415
Navegar
6 resultados
Resultados da Pesquisa
Item Desenvolvimento de no-code no FlowUp: construção de campos personalizáveis(2024-10-04) Santos, João Victor Vieira Silva dos; Monteiro, Cleviton Vinicius Fonsêca; http://lattes.cnpq.br/9362573782715504; http://lattes.cnpq.br/5366897410770757This study focuses on the implementation of No-Code features in the FlowUp ERP system to provide greater flexibility and customization for users. Using the Design Thinking methodology, customizable fields were developed, allowing for better adaptation of the system to the specific needs of each company. Interviews with stakeholders confirmed the usefulness of the feature, suggesting improvements for its expansion. The study concludes that the introduction of No-Code in FlowUp is an efficient solution for customization, offering new possibilities for system evolution and data integration.Item Comparação de VPN e ZTNA: uma análise de segurança e desempenho em ambientes corporativo(2024-09-30) Chagas, Marcelino Francisco Gomes das; Medeiros, Robson Wagner Albuquerque de; http://lattes.cnpq.br/3169193612606500Constant technological advances and the rapid expansion of infrastructures in public cloud providers have created significant challenges for companies, especially with regard to information security. Traditional security measures, such as Virtual Private Networks (VPNs), which create a secure tunnel for data transmission between the user and the corporate network, are not always adequate to protect data in cloud environments, resulting in a growing need to re-evaluate protection strategies. The COVID-19 pandemic has further intensified this demand, as organizations have been forced to adopt remote working practices on a large scale. In this scenario, trust in the final data has become a critical concern, especially given the limitations of traditional VPN solutions. In response to these challenges, Zero Trust Architecture (ZTA) and Zero Trust Network Access (ZTNA) have emerged as promising approaches. ZTNA is a technology based on the principles of ZTA that redefines network access control by eliminating implicit trust in any user or device, regardless of their location, and requiring continuous verification for every access attempt. This approach offers more granular security at the network and access control level, and is adaptable in on-premise and cloud environments, protecting data in distributed and constantly evolving corporate environments. The aim of this work is to carry out a comparative analysis of VPN and ZTNA network technologies, with an emphasis on evaluating security and performance. The security features offered by each technology will be examined, including authentication, access control and encryption, as well as the impact of these technologies on network performance in terms of latency, bandwidth and response time. Through this analysis, we aim to identify the advantages and disadvantages of each technological approach, offering valuable insights for IT professionals and organizations in selecting and implementing the solution best suited to their security and performance needs in modern corporate environments.Item Analisando a presença feminina no Ensino Superior em Tecnologia no Brasil ao longo dos anos de 2013 a 2022(2024-03-07) Ramos, Giuliane Benjamim de Oliveira; Alencar, Andrêza Leite de; Furtado, Ana Paula Carvalho Cavalcanti; http://lattes.cnpq.br/5862330768739698; http://lattes.cnpq.br/6060587704569605; http://lattes.cnpq.br/6421196285147828Masculine stigma, low family encouragement, and lack of representation are the main factors that justify the underrepresentation of women in the technology field. Therefore, this paper aims to highlight the current female landscape in Information Technology (IT) higher education courses in Brazil. To achieve this purpose, a literature review and analysis of microdata from the Higher Education Census from 2013 to 2022, provided by the National Institute for Educational Studies and Research An´ısio Teixeira (INEP), were conducted. The analysis shows significantly low female representation in higher education technology courses over the analyzed period - female enrollments do not exceed 17%, the completion rate averages 15%, and the Southeast region has the highest number of female representatives in IT courses, with São Paulo standing out. However, a trend of increase can be observed in the last two years.Item Avaliação experimental de replicação em banco de dados para recuperação de desastres(2020-12-18) Santos Neto, Wilson Medeiros dos; Andrade, Ermeson Carneiro de; http://lattes.cnpq.br/2466077615273972; http://lattes.cnpq.br/1208163441814364IT systems are essential for the operations of any modern business. Such systems must support operations of their corresponding company under any conditions. Disaster Recovery (DR) strategies have been implemented to help organizations mitigate unexpected failures and reduce unnecessary expenses. However, to the best of our knowledge, no other work experimentally analyzes data replication at the database layer with a focus on DR strategies. Therefore, this work evaluates a relational database replication as a mean of implementing a DR solution. We use a real testbed in a public cloud environment to perform extensive experiments aimed at implementing the replication provided by MySQL, considering various scenarios in the context of DR. Our results show how response time, Recovery Point Objective (RPO) and Recovery Time Objective (RTO) vary according to the size of the replicated data, the synchronization type (ex.: asynchronous or semisynchronous) and the configuration of the slave servers. This work can assist DR coordinators or individuals to decide which database replication configuration for disaster recovery is best for their work environment.Item Um guia para organização de hackathons corporativos no contexto de inovação(2020-10-27) Oliveira, Nycolas Lacerda de; Santos, George Augusto Valença; http://lattes.cnpq.br/8525564952779211; http://lattes.cnpq.br/9735432226857557Hackathons have become a worldwide innovation phenomenon thanks to a paradigm shift. From events focused on solving system bugs, they came to be perceived as a strategy for open innovation in small to large organizations, such as Uber and Facebook. When promoted by private companies, they are known as corporate hackathons, with key business activities as the object of analysis by the participants. Organizing a corporate hackathon is not a trivial process, considering issues such as the type of audience to be involved, the duration of the event or the technologies and challenges to be presented. Motivated by this scenario, we carry out a systematic mapping to identify the process of corporate hackathons (pre-hackathon, hackathon and post-hackathon) as well as its main characteristics (objectives, participants, duration, location and application domain) based on a set of 29 primary articles. At the end, we conducted a review by experts, with participants and hackathon organizers to interpret our findings and raise adjustment needs. In this way, our main contribution is to propose a guide for organizing corporate hackathons extracted from the literature and later enriched with the expert’s view.Item O consumo de internet no processo de construção social da identidade de adolescentes integrantes de uma ONG em Jaboatão dos Guararapes(2018) Reis, Juliane de Santana; Albuquerque, Hortência Cruz de; http://lattes.cnpq.br/4316127961561473The digital era, through the internet, had its fruit in the expansion and development of the capitalist system, which provided the possibility of new forms of communication in the globalized technological context. Thus, virtual entertainment gains more and more space for use in the daily lives of families. In this way, with the advancement of information and communication technology, we have the facility to make purchases through the internet, make payments to accounts, talk to friends who are distant, know news from Brazil and the world, all this in real time, which seems to be a facilitator for the interaction of adolescents, since much dominates these tools. Adolescence consists of a phase of changes, both physiological, psychic and social, and considering that in the midst of these transformations, there is the search for identity, which comes to be present in the questions of adolescents and that will lead to countless experiences that will be intensely experienced throughout adolescence. However, how have teens dealt with the internet? Thus, this work is the result of the experience of compulsory supervised internship at an NGO in Jaboatão dos Guararapes, and aimed to analyze the influence of Internet consumption on the process of social construction of adolescents' identity. The methodological procedures used were bibliographic review, participant observation and semi-structured questionnaire application. The research is exploratory, descriptive and qualitative. And the results point out that the internet is configured as a more comprehensive medium for interaction and socialization of adolescents, being essential the consumption of technology / internet since they associate it with the synonym of pleasure and leisure, and hence it is necessary to discuss more on the relation of consumption of technologies and the behavior of the adolescents before the society of consumption.