In today's circumstances, there is a phenomenon for people to want to find out culture outside their neighborhood. This can be realized by collaborating technology with cultural tourism. This study discusses the a...
详细信息
Since internet service is mostly available in many countries, tunneling solution over an internet link often used in the company for network communication between its multi-regional branches. The current state of the ...
详细信息
Since internet service is mostly available in many countries, tunneling solution over an internet link often used in the company for network communication between its multi-regional branches. The current state of the art solution consisting of an EoIP tunnel combined with IPsec installed on the Head Quarter of the company. Researchers see this solution as prone to total network disruption when the HQ loses its internet service. With the rising trend of cloud computing development, researchers then propose a multi-region network infrastructure design consist of MikroTik devices and Cloud platforms using EoIP IPsec protocol. Cloud platform used as an EoIP IPsec gateway due to its high availability. From the implementation and testing, the EoIP Cloud gateway proved to have high network availability. Branch network communication proved to be running well with no impact on the HQ loss of internet services. IPsec also proved to be secure enough to secure user data transmitted over the internet. From the QoS findings, there is a 24ms drop in delay performance and 0,66 ms drop in jitter performance. The EoIP IPsec on cloud platform also proved to have a 0,97% improvement in throughput performance and has a 0% packet loss rate.
Symbolic computation for systems of differential equations is often computationally expensive. Many practical differential models have a form of polynomial or rational ODE system with specified outputs. A basic symbol...
详细信息
Indonesia's Food and Beverage (F&B) development is increasing rapidly every day. Our surroundings demonstrate that more and more food and beverage items, particularly light snacks, are being sold. As a result,...
Indonesia's Food and Beverage (F&B) development is increasing rapidly every day. Our surroundings demonstrate that more and more food and beverage items, particularly light snacks, are being sold. As a result, the company's chances of connecting with a potential customer are indirectly reduced as market competition in the F &B industry heats up. To solve this problem, MunchUp, which specializes in selling light snacks F &B, tries to fully shift its marketing strategy to utilize the latest technology. The technology that MunchUp uses is a website and mobile-based applications. This research aims to investigate the impact of website and mobile app usage on the selling margin of a business. The study was conducted by analyzing sales data from a sample of the companies that have implemented a website and mobile app for their sales process. The study results indicate that businesses with a website and mobile app have seen an increase in their selling margin compared to companies that do not have a website and mobile app. The study also found that features such as push notifications, loyalty programs, and personalized recommendations can help keep customers engaged and encourage repeat purchases. This research suggests that a well-designed and user-friendly website and mobile app can be a powerful tool for any business looking to boost its sales and increase its revenue.
This research explores the vital role of penetration testing in cybersecurity, specifically its alignment with ISO 27001:2022, COBIT 2019, and NIST CSF standards in the context of crypto asset exchange management. The...
This research explores the vital role of penetration testing in cybersecurity, specifically its alignment with ISO 27001:2022, COBIT 2019, and NIST CSF standards in the context of crypto asset exchange management. These sectors grapple with rapidly evolving threat landscapes, necessitating robust cybersecurity strategies. However, the integration of penetration testing with these standards remains underexamined. Through a comprehensive approach, including literature reviews, surveys, case studies, and interviews, this study investigates the incorporation of penetration testing into an organization's cybersecurity. It unveils the current state of penetration testing practices, interprets ISO 27001:2022, COBIT 2019, and NIST CSF perspectives, and pinpoints integration challenges and opportunities. This study offers practical insights and best practices for integrating penetration testing into cybersecurity frameworks by emphasizing alignment. It underscores the importance of aligning penetration testing with information security standards in the crypto asset exchange management sector, enhancing security, proactively identifying vulnerabilities, and effectively mitigating risks in the context of growing crypto asset importance. This research provides invaluable guidance for safeguarding digital assets in this evolving domain.
Mostly Drugstores do not have any system that exclusively connect to access E-commerce system because the marketing concept of drugstores still use conventional store to sell their products. According to this situatio...
详细信息
The area of oil palm plantations in Indonesia increased by 7% from 14 million ha in 2017 to 15 million ha in 2021. The vast land requires the support of effective and efficient management techniques to maintain sustai...
详细信息
E-learning is used as one of the innovations in online learning, but in its implementation e-learning has limitations, especially in terms of flexibility, so that new innovations emerge, namely learning using m-learni...
详细信息
The COVID pandemic has caused tremendous loss worldwide. Now vaccines are the primary weapon to combat the pandemic. Understanding how SARS-CoV-2, the virus that causes the COVID, may mutate in the presence of the vac...
详细信息
Scrum is widely used to manage application development, including third-party vendors. There are some problems when third-party vendor using scrum such as communication challenges, lack of control, and lack of trust. ...
详细信息
Scrum is widely used to manage application development, including third-party vendors. There are some problems when third-party vendor using scrum such as communication challenges, lack of control, and lack of trust. Therefore, we proposed new model of distributed scrum using Scrum of Scrum and Holonic view to manage an application development project in third party vendors. In this study we created 3 model, Scrum Team Model, Meeting Coordination Model, and Product Backlog Model. In this study it has been shown that the Distributed scrum method is better than waterfall method as a result of the project’s success based on scope, time, and cost aspects. Based on the comparison result, it is found that the Cost Performance Index (CPI) and the Schedule Performance Index (SPI) value of the waterfall approach project is smaller than the Distributed scrum approach project as well as the change request issued by the Distributed scrum project resulting is less than the waterfall project.
暂无评论