992 resultados para Enterprise Architecture


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article presents software architecture for a web-based system to aid project managing, conceptually founded on guidelines of the Project Management Body of Knowledge (PMBoK) and on ISO/IEC 9126, as well as on the result of an empiric study done in Brazil. Based on these guidelines, this study focused on two different points of view about project management: the view of those who develop software systems to aid management and the view of those who use these systems. The designed software architecture is capable of guiding an incremental development of a quality system that will satisfy today's marketing necessities, principally those of small and medium size enterprises.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The adoption of ERPs systems by small and middle-sized companies may not be possible due to their cost. At the same time, when adapting ERP to the company's particular needs, the user keeps depending on the system's sellers due to the lack of access and knowledge of the respective code. Free and open-source software may promote advantages to the enterprises, however, for its adoption it is necessary the development of techniques and tools in order to facilitate its deployment and code maintenance. This article emphasizes the importance of defining modeling architectures and reference models for the development and maintenance of open-source ERPs, in special the ERP5 project.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The use of semantic and Linked Data technologies for Enterprise Application Integration (EAI) is increasing in recent years. Linked Data and Semantic Web technologies such as the Resource Description Framework (RDF) data model provide several key advantages over the current de-facto Web Service and XML based integration approaches. The flexibility provided by representing the data in a more versatile RDF model using ontologies enables avoiding complex schema transformations and makes data more accessible using Web standards, preventing the formation of data silos. These three benefits represent an edge for Linked Data-based EAI. However, work still has to be performed so that these technologies can cope with the particularities of the EAI scenarios in different terms, such as data control, ownership, consistency, or accuracy. The first part of the paper provides an introduction to Enterprise Application Integration using Linked Data and the requirements imposed by EAI to Linked Data technologies focusing on one of the problems that arise in this scenario, the coreference problem, and presents a coreference service that supports the use of Linked Data in EAI systems. The proposed solution introduces the use of a context that aggregates a set of related identities and mappings from the identities to different resources that reside in distinct applications and provide different views or aspects of the same entity. A detailed architecture of the Coreference Service is presented explaining how it can be used to manage the contexts, identities, resources, and applications which they relate to. The paper shows how the proposed service can be utilized in an EAI scenario using an example involving a dashboard that integrates data from different systems and the proposed workflow for registering and resolving identities. As most enterprise applications are driven by business processes and involve legacy data, the proposed approach can be easily incorporated into enterprise applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

From its humble beginnings as a small workshop established by Tomáš Baťa in 1874, the Bata Shoe Company became a gigantic concern in the 1920s, built on the principles of scientific management and welfare capitalism. The growth of the company engulfed Zlín (in today’s Czech Republic), its hometown, and transformed it into a modern industrial garden city satisfying the needs of both a growing industrial population, and those of the company itself. As a reaction to the aftermath of the crisis of 1929, the enterprise began a strategy of decentralization and international expansion characterized by the design and construction of a series of modern industrial towns that replicated the model of Zlín around the globe. This study is an exhaustive survey of these cities, their rationale, design, and their postindustrial conditions; it is a comparative work that has used field trips, photography, interviews, and archival material to explain the logics behind Bata’s project, to document the design and implementation of the model to multiple contexts and geographies, and to evaluate of the urban legacy of this undertaking. Finally, the research explores the question of what can the design disciplines, and other parties involved, learn from a full synthesis on the history and urbanism of the Bata satellite cities with regard to the re-imagination and sustainability of contemporary industry-sponsored interventions in developing geographies. RESUMEN Con origen en un humilde y pequeño taller fundado en 1874 por Tomáš Baťa, la Bata Shoe Company creció hasta convertirse en una gigantesca empresa en los anos 20, fundada en principios de control científico de la producción y capitalismo de bienestar. El crecimiento de la compañía se extendió por Zlín (en la actual República Checa), su pueblo de nacimiento, y la transformó en una moderna ciudad jardín industrial capaz de satisfacer las necesidades tanto de una población en alza como de la propia empresa. Como reacción a la crisis de 1929, Bata inició una estrategia de descentralización y expansión internacional caracterizada por el proyecto y construcción de modernas ciudades industriales que replicaron el modelo de Zlín por el mundo. Esta tesis es un estudio exhaustivo de estas ciudades: las razones detrás del proyecto, su diseño, y su condición post-industrial; es un estudio comparativo que se ha servido de trabajo de campo, documentación fotográfica, entrevistas y materiales de archivo para explicar la lógica detrás del proyecto de Bata, documentar el diseño e implementación de tal modelo en múltiples contextos y geografías, y valorar el legado urbano de esta empresa. Finalmente, la investigación evalúa qué podrían aprender las disciplinas del diseño y otras partes implicadas de una síntesis completa de la historia y el urbanismo de las ciudades satélite de Bata, en lo relativo a la reinvención y sostenibilidad de proyectos contemporáneos de la industria en geografías en desarrollo.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to help managers to successfully plan, implement, and operate enterprise resource planning (ERP) projects using a risk management framework. Design/methodology/approach – This paper adopted a combined literature review and case study method. Using literature review, the paper first identified major issues of managing ERP projects and develops a risk management framework for managing those issues. The proposed risk management framework was then applied to a ERP implementation project of a UK-based energy services group and its effectiveness for managing ERP projects implementation had been demonstrated. Additionally, the risk factors as identified from the case application are compared with the risk factors from the previous researches so as to suggest mitigating measures. Findings – All the risk factors are categorized into planning, implementation and operations phases along with project processes, organizational transformation and information technology (IT) perspectives. Project implementation phase is the most vulnerable to failure. The case study results reveal that the effect of other projects on on-going ERP project, management of overall IT architecture and non-availability of resources for organizational transformation are most critical from likelihood and impact perspectives. Managing risk across various phases of project and equal emphasize to effective project management, organizational transformation and IT adoption are the key to success in ERP implementation. Practical implications – The risk factors, which were identified using literature review and the case study, have great significance as mitigating measures of those risks may result successful implementation of ERP projects in the industry. Additionally, proposed risk management framework could be customized to implement ERP projects elsewhere. Originality/value – ERP projects are risky as they are capital intensive, technically complex, and call for organizational transformation. There are both success and failure stories. However, both researchers and practitioners agree, that if it can be implemented and operated successfully and benefits should be achievable. Although there are many studies on ERP implementation, little has been discussed on managing risks of ERP projects. Therefore, this paper bridges the gap.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper describes a PC-based mainframe computer emulator called VisibleZ and its use in teaching mainframe Computer Organization and Assembly Programming classes. VisibleZ models IBM’s z/Architecture and allows direct interpretation of mainframe assembly language object code in a graphical user interface environment that was developed in Java. The VisibleZ emulator acts as an interactive visualization tool to simulate enterprise computer architecture. The provided architectural components include main storage, CPU, registers, Program Status Word (PSW), and I/O Channels. Particular attention is given to providing visual clues to the user by color-coding screen components, machine instruction execution, and animation of the machine architecture components. Students interact with VisibleZ by executing machine instructions in a step-by-step mode, simultaneously observing the contents of memory, registers, and changes in the PSW during the fetch-decode-execute machine instruction cycle. The object-oriented design and implementation of VisibleZ allows students to develop their own instruction semantics by coding Java for existing specific z/Architecture machine instructions or design and implement new machine instructions. The use of VisibleZ in lectures, labs, and assignments is described in the paper and supported by a website that hosts an extensive collection of related materials. VisibleZ has been proven a useful tool in mainframe Assembly Language Programming and Computer Organization classes. Using VisibleZ, students develop a better understanding of mainframe concepts, components, and how the mainframe computer works. ACM Computing Classification System (1998): C.0, K.3.2.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of AC functionality with application logic causes significant problems including tremendously difficult, costly and error prone development, integration, and overall ownership of application software. The way AC for application systems is engineered needs to be changed. ^ In this dissertation, we propose an architectural approach for engineering AC mechanisms to address the above problems. First, we develop a framework for implementing the role-based access control (RBAC) model using AC mechanisms provided by CORBA Security. For those application domains where the granularity of CORBA controls and the expressiveness of RBAC model suffice, our framework addresses the stated problem. ^ In the second and main part of our approach, we propose an architecture for an authorization service, RAD, to address the problem of controlling access to distributed application resources, when the granularity and support for complex policies by middleware AC mechanisms are inadequate. Applying this architecture, we developed a CORBA-based application authorization service (CAAS). Using CAAS, we studied the main properties of the architecture and showed how they can be substantiated by employing CORBA and Java technologies. Our approach enables a wide-ranging solution for controlling the resources of distributed enterprise applications. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Access control (AC) is a necessary defense against a large variety of security attacks on the resources of distributed enterprise applications. However, to be effective, AC in some application domains has to be fine-grain, support the use of application-specific factors in authorization decisions, as well as consistently and reliably enforce organization-wide authorization policies across enterprise applications. Because the existing middleware technologies do not provide a complete solution, application developers resort to embedding AC functionality in application systems. This coupling of AC functionality with application logic causes significant problems including tremendously difficult, costly and error prone development, integration, and overall ownership of application software. The way AC for application systems is engineered needs to be changed. In this dissertation, we propose an architectural approach for engineering AC mechanisms to address the above problems. First, we develop a framework for implementing the role-based access control (RBAC) model using AC mechanisms provided by CORBA Security. For those application domains where the granularity of CORBA controls and the expressiveness of RBAC model suffice, our framework addresses the stated problem. In the second and main part of our approach, we propose an architecture for an authorization service, RAD, to address the problem of controlling access to distributed application resources, when the granularity and support for complex policies by middleware AC mechanisms are inadequate. Applying this architecture, we developed a CORBA-based application authorization service (CAAS). Using CAAS, we studied the main properties of the architecture and showed how they can be substantiated by employing CORBA and Java technologies. Our approach enables a wide-ranging solution for controlling the resources of distributed enterprise applications.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This chapter discusses the growth and nature of community enterprise and in particular the sub-set of asset-based community development trusts and reviews their contribution to urban regeneration in Britain. Three models are presented and illustrated with case studies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Energy efficient policies are being applied to network protocols, devices and classical network management systems. Researchers have already studied in depth each of those fields, including for instance a long monitoring processes of various number of individual ICT equipment from where power models are constructed. With the development of smart meters and emerging protocols such as SNMP and NETCONF, currently there is an open field to couple the power models, translated to the expected behavior, with the realtime energy measurements. The goal is to derive a comparison on the power data between both of the processes in the direction of detection for possible deviations on the expected results. The logical assumption is that a fault in the usage of a particular device will not only increase its own energy usage, but also may cause additional consumption on the other devices part of the network. A platform is developed to monitor and analyze the retrieved power data of a simulated enterprise ICT infrastructure. Moreover, smart algorithms are developed which are aware of the different states that are occurring on each device during their typical use phase, as well as to detect and isolate possible anomalies. The produced results are obtained and validated with the use of Cisco switches and routers, Dell Precision stations and Raritan PDU as part of the monitored infrastructure.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Part 2: Behaviour and Coordination