14 resultados para personale, outsourcing, logistica, NFC, timbrature, ore

em Universidad Politécnica de Madrid


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Esperanza Zn-Pb-Ag vein, owned by Compañía de Minas Buenaventura S.A.A., lies over 4000 to 4650 masl in the Western Cordillera of the Peruvian Central Andes. The Esperanza low sulphidation epithermal vein trends ~E-W along 1500 m; it dips to the South and can be followed to 350 m depth. As other veins of the district, like Teresita and Bienaventurada, it is hosted by intermediate to felsic volcanics (andesitic to dacitic compositions) of the Huachocolpa Group (Middle Miocene to Upper Pliocene). The mineralisation occurs mostly as open space filling related to fracture development during the Quechua III deformational event. Main ore minerals are sphalerite, galena, tetrahedrite, pyrite, chalcopyrite and Ag and Pb sulfosalts; quartz, barite and calcite are the main gangue minerals. Current production grades are ~5% Zn, ~8Oz/t Ag, ~3% Pb; usually very low Cu (mean ~0.04%).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mining in the Iberian Pyrite Belt (IPB), the biggest VMS metallogenetic province known in the world to date, has to face a deep crisis in spite of the huge reserves still known after ≈5 000 years of production. This is due to several factors, as the difficult processing of complex Cu-Pb-Zn-Ag- Au ores, the exhaustion of the oxidation zone orebodies (the richest for gold, in gossan), the scarce demand for sulphuric acid in the world market, and harder environmental regulations. Of these factors, only the first and the last mentioned can be addressed by local ore geologists. A reactivation of mining can therefore only be achieved by an improved and more efficient ore processing, under the constraint of strict environmental controls. Digital image analysis of the ores, coupled to reflected light microscopy, provides a quantified and reliable mineralogical and textural characterization of the ores. The automation of the procedure for the first time furnishes the process engineers with real-time information, to improve the process and to preclude or control pollution; it can be applied to metallurgical tailings as well. This is shown by some examples of the IPB.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This work is part of the project CAMEVA for the development of an expert system aimed at the automatic identification of ores [1, 2]. It relies on the measure of their reflectance values, R, on digital images. Software for calibration, acquisition and analysis of the multispectral data was designed by AITEMIN [3]; the research was also assessed by H.J. Bernhardt and E. Pirard [1].

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A joint research to develop an efficient method for automated identification and quantification of ores [1], based on Reflected Light Microscopy (RLM) in the VNIR realm (Fig. 1), provides an alternative to modern SEM based equipments used by geometallurgists, but for ~ 1/10th of the price.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a comparison of acquisition models related to decision analysis of IT supplier selection. The main standards are: Capability Maturity Model Integration for Acquisition (CMMI-ACQ), ISO / IEC 12207 Information Technology / Software Life Cycle Processes, IEEE 1062 Recommended Practice for Software Acquisition, the IT Infrastructure Library (ITIL) and the Project Management Body of Knowledge (PMBOK) guide. The objective of this paper is to compare the previous models to find the advantages and disadvantages of them for the future development of a decision model for IT supplier selection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Analiza el outsourcing como factor clave para la competitividad

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Se investiga la compleja mineralogía del Yacimiento de Pallancata (6º productor de plata del mundo) y se establecen las condiciones de formación (P.T) basadas en la petrología de las menas comparada con los datos de mineralogía experimental y en la petrografía y microtermometría de inclusiones fluídas en la ganga silicatada, resultando un depósito típicamente caracterizado como epitermal de sulfuración intermedia.ABSTRACT:Pallancata is a world-class intermediate-sulfidation epithermal deposit, hosted by upper Miocene volcanics of the south-central Peruvian Andes in a sinuous N70ºW, ∼75º SW strike-slip structure, with wide (up to 35 m) pull-apart dilation zones related to bends of the vein strike. The structural evolution of the vein from earlier brecciation to later open space infill resembles the Shila Paula district (Chauvet et al. 2006). Fluid inclusion petrography and microthermometry show that ore deposition is related to protracted boiling of very diluted, mainly meteoric fluids, starting at 250–260 ºC, under ∼300 m hydrostatic head. The mineralogical-petrological study reveals a complex sequence of mineralization (eight stages) and mineral reactions consistent with Ag2S enrichment or Sb2S3 depletion, or both, during cooling over the temperature range 250–200 ºC: pyrite, sphalerite, galena, miargyrite, pyrargyrite-proustite, chalcopyrite, polybasite-pearceite, argentite (now acanthite), and Au–Ag alloy (“electrum”). This Ag2S enrichment and Sb2S3depletion during cooling may be explained by decay of a Ag-rich galena precursor at deeper levels (Pb2S2–AgSbS2 solid solution), which rapidly becomes unstable with decreasing temperature, producing residual (stoichiometric) PbS and more mobile Ag and Sb sulfide phases, which migrated upward and laterally away from the thermal core of the system. The core is still undisclosed by mining works, but the available geochemical evidence (logAg/log Pb ratios decreasing at depth) is consistent with this interpretation, implying a deeper potential resource. Data from sulfide geothermometry, based on mineral equilibria, document the thermal evolution of the system below 200 ºC (stephanite, uytenbogaardtite, jalpaite, stromeyerite, mckinstryite, among others). The end of the most productive stages (3, 4, and 5) is marked by the precipitation of stephanite at temperatures below 197 ± 5 ºC, but precipitation of residual silver continues through the waning stages of the hydrothermal system down to <93.3 ºC (stromeyerite) or in a supergene redistribution (stage 8, acanthite II).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Ubiquitous computing (one person, many computers) is the third era in the history of computing. It follows the mainframe era (many people, one computer) and the PC era (one person, one computer). Ubiquitous computing empowers people to communicate with services by interacting with their surroundings. Most of these so called smart environments contain sensors sensing users’ actions and try to predict the users’ intentions and necessities based on sensor data. The main drawback of this approach is that the system might perform unexpected or unwanted actions, making the user feel out of control. In this master thesis we propose a different procedure based on Interactive Spaces: instead of predicting users’ intentions based on sensor data, the system reacts to users’ explicit predefined actions. To that end, we present REACHeS, a server platform which enables communication among services, resources and users located in the same environment. With REACHeS, a user controls services and resources by interacting with everyday life objects and using a mobile phone as a mediator between himself/herself, the system and the environment. REACHeS’ interfaces with a user are built upon NFC (Near Field Communication) technology. NFC tags are attached to objects in the environment. A tag stores commands that are sent to services when a user touches the tag with his/her NFC enabled device. The prototypes and usability tests presented in this thesis show the great potential of NFC to build such user interfaces.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El mercado de outsourcing ha estado creciendo en los últimos años y se prevé que lo siga haciendo en los próximos, pero este crecimiento ha estado limitado por el fracaso de muchos proyectos que, en algunos casos, han llevado a las organizaciones a asumir de nuevo esos servicios (insourcing). Estos fracasos se han debido en gran parte a los problemas con los proveedores: falta de experiencia, de capacidades para asumir los proyectos, dificultad en la comunicación. Así como hay marcos de buenas prácticas para la gestión de los proyectos de outsourcing para los clientes, no ocurre lo mismo con los proveedores, que basan la provisión de los servicios en sus experiencias anteriores y en sus capacidades técnicas. El objetivo de este artículo es demostrar la necesidad de proponer una metodología que guíe a los proveedores durante todo el ciclo de vida un proyecto de outsourcing y que facilite la provisión de servicios de calidad y bien gestionados. ABSTRACT. The outsourcing market has been growing in recent years and it is expected to keep doing it, but this growth has been limited by the failure of many projects. These failures have been due to a major degree to problems with providers: lack of experience and capacity to take on the projects and difficult communication. There are good practices frameworks for managing outsourcing projects for clients, but it is not the same for providers, who base the provision of services on their past experience and technical capabilities. The aim of this paper is to state the need to propose a methodology that guides providers throughout the whole outsourcing life cycle and facilitates the provision of quality services and their management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Los avances tecnológicos actuales que han llevado a una economía globalmente conectada, junto con la creciente tendencia hacia la privatización, globalización y desregulación están dando lugar a nuevos modelos organizativos y a un aumento de la colaboración entre proveedores y clientes, compartiendo información y flujos de proceso. Todo ello ha contribuido directamente a la gran expansión del outsourcing y a que se considere como una herramienta estratégica para las organizaciones. En este entorno y dada la creciente complejidad organizativa, el uso de una metodología para ayudar a la implantación de proyectos de outsourcing se ha convertido en algo casi necesario. En los últimos años se han propuesto algunas metodologías, especialmente para apoyo de las organizaciones cliente de outsourcing, pero no consideramos que sean completas en cuanto a contemplar todos los aspectos necesarios para guiar un proyecto de outsourcing. Es por ello que, en este artículo, proponemos una metodología para gestión de proyectos de outsourcing de TI desde el punto de vista del proveedor que sea completa y fácil de aplicar. Abstract -. Current technological advances that have led to a globally connected economy, together with the increasing trend towards privatization and deregulation, are leading to new organizational models and increased collaboration between suppliers and customers, sharing information and process flows. This has directly contributed to the great expansion of outsourcing, considering it as a strategic tool for organizations. In this environment, and given the increasing organizational complexity, the use of a methodology to assist the implementation of outsourcing projects has become almost necessary. In recent years several methodologies and models have been proposed, especially for supporting client outsourcing organizations, but we do not consider them to be complete, they do not cover all necessary aspects to manage an outsourcing project. That is the reason because we, in this paper, propose a methodology for outsourcing project management from the point of view of the suppliers that was complete and easy to apply.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El mercado de outsourcing ha estado creciendo en los últimos años y se espera que lo siga haciendo, pero este crecimiento se ha visto limitado por el fracaso de muchos proyectos. Estos fracasos se han debido en gran parte a los problemas con los proveedores: la falta de experiencia y capacidad para asumir los proyectos, y una comunicación difícil. Se han propuesto marcos de buenas prácticas para la gestión de proyectos de outsourcing desde el punto de vista del cliente, pero no ha sido así para los proveedores, que basan la prestación de servicios en su experiencia pasada y sus capacidades técnicas. El objetivo de este trabajo es establecer la necesidad de proponer una metodología que guíe a los proveedores a lo largo de todo el ciclo de vida del outsourcing y facilite la provisión de servicios de calidad y bien gestionados. ABSTRACT. The outsourcing market has been growing in recent years and it is expected to keep doing it, but this growth has been limited by the failure of many projects. These failures have been due to a major degree to problems with providers: lack of experience and capacity to take on the projects and difficult communication. There are good practices frameworks for managing outsourcing projects for clients, but it is not the same for providers, who base the provision of services on their past experience and technical capabilities. The aim of this paper is to state the need to propose a methodology that guides providers throughout the whole outsourcing life cycle and facilitates the provision of quality services and their management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

El mercado de outsourcing ha estado creciendo en los últimos años y se prevé que lo siga haciendo en los próximos, pero este crecimiento ha estado limitado por el fracaso de muchos proyectos que, en algunos casos, han llevado a las organizaciones a asumir de nuevo esos servicios (insourcing). Estos fracasos se han debido en gran parte a los problemas con los proveedores: falta de experiencia, de capacidades para asumir los proyectos, dificultad en la comunicación,… A diferencia de lo que ocurre en otras disciplinas, no existe una metodología que ayude, tanto a los clientes como a los proveedores de servicios de outsourcing de TI, a gobernar y gestionar sus proyectos y conseguir los resultados buscados. En los últimos años han aparecido, al mismo tiempo que la expansión del outsourcing, algunos modelos y marcos de buenas prácticas para la gestión de los proyectos de outsourcing, pero generalmente sólo cubren algunos aspectos de la gestión. No se los puede considerar metodologías, porque no definen roles, responsabilidades ni entregables. Por lo general, son el resultado de la experiencia en la gestión de otros tipos de proyectos. Hay que considerar también que, excepto eSCM-SP, que es un modelo de buenas prácticas para mejorar la capacidad en la provisión de servicios, están todos orientados al cliente. El objetivo de esta tesis es, por un lado, demostrar la necesidad de contar con una metodología que guíe a los proveedores durante todo el ciclo de vida un proyecto de outsourcing y, por otro, proponer una metodología que contemple desde la fase inicial de la búsqueda de oportunidades de negocio, evaluación de las propuestas RFP, la decisión de hacer una oferta o no para la prestación de servicios, la participación en la due diligence, la firma del contrato, la transición y la entrega de servicios, hasta la finalización del contrato. La metodología se ha organizado en base a un ciclo de vida del outsourcing de cinco etapas, definiendo para cada una de ellas los roles que participan y las responsabilidades que deberán asumir, las actividades a realizar y los entregables que se deberán generar, y que servirán de elementos de control tanto para la gestión del proyecto como para la provisión del servicio. La validación de la metodología se ha realizado aplicándola en proyectos de provisión de servicios de TI de una mediana empresa española y comparando los resultados obtenidos con los conseguidos en proyectos anteriores. ABSTRACT The outsourcing market has been growing in recent years and it is expected to keep doing so in the coming years, but this growth has been limited by the failure of many projects that, in some cases, has led organizations to take back those services (insourcing). These failures have been due to a major degree to problems with providers: lack of experience and capacity to take on the projects, and difficulties of communication. Unlike what happens in other disciplines, there is no methodology for helping both customers and providers of outsourcing services. In recent years, some good practice frameworks have also appeared at the same time as the expansion of outsourcing. They are not methodologies because they have not defined any roles, responsibilities and deliverables. These frameworks aim to help organizations to be successful at managing and governing outsourcing projects. They are usually the result of their experience in managing other kinds of projects. In consequence, it is not appropriate to name them "methodologies" for managing outsourcing projects and much less "standards". It is also important to note that all existing good practice frameworks, except eSCM-SP, are client-oriented. The aim of this thesis is to state the need to propose a methodology that guides providers throughout the whole outsourcing life cycle and facilitates the provision of quality services and their management, and the proposal of a methodology in which the stages, activities, deliverables, roles and responsibilities are clearly defined. The proposed methodology cover all the stages of the outsourcing life cycle, from the early stage of searching for business opportunities, evaluation of the RFP proposals, the decision to bid or not to bid for the service provision, participation in the due diligence if necessary, the signing of the contract, the transition and delivery of service to the termination of the contract. For each activity, roles, responsibilities and deliverables have been defined. The validation of the methodology has been done by applying it in the provision of some outsourcing projects carried out by a Spanish IT medium company and comparing the results with those obtained in previous projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New technologies such as, the new Information and Communication Technology ICT, break new paths and redefines the way we understand business, the Cloud Computing is one of them. The on demand resource gathering and the per usage payment scheme are now commonplace, and allows companies to save on their ICT investments. Despite the importance of this issue, we still lack methodologies that help companies, to develop applications oriented for its exploitation in the Cloud. In this study we aim to fill this gap and propose a methodology for the development of ICT applications, which are directed towards a business model, and further outsourcing in the Cloud. In the former the Development of SOA applications, we take, as a baseline scenario, a business model from which to obtain a business process model. To this end, we use software engineering tools; and in the latter The Outsourcing we propose a guide that would facilitate uploading business models into the Cloud; to this end we describe a SOA governance model, which controls the SOA. Additionally we propose a Cloud government that integrates Service Level Agreements SLAs, plus SOA governance, and Cloud architecture. Finally we apply our methodology in an example illustrating our proposal. We believe that our proposal can be used as a guide/pattern for the development of business applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

En esta tesis se aborda el problema de la externalización segura de servicios de datos y computación. El escenario de interés es aquel en el que el usuario posee datos y quiere subcontratar un servidor en la nube (“Cloud”). Además, el usuario puede querer también delegar el cálculo de un subconjunto de sus datos al servidor. Se presentan dos aspectos de seguridad relacionados con este escenario, en concreto, la integridad y la privacidad y se analizan las posibles soluciones a dichas cuestiones, aprovechando herramientas criptográficas avanzadas, como el Autentificador de Mensajes Homomórfico (“Homomorphic Message Authenticators”) y el Cifrado Totalmente Homomórfico (“Fully Homomorphic Encryption”). La contribución de este trabajo es tanto teórica como práctica. Desde el punto de vista de la contribución teórica, se define un nuevo esquema de externalización (en lo siguiente, denominado con su término inglés Outsourcing), usando como punto de partida los artículos de [3] y [12], con el objetivo de realizar un modelo muy genérico y flexible que podría emplearse para representar varios esquemas de ”outsourcing” seguro. Dicho modelo puede utilizarse para representar esquemas de “outsourcing” seguro proporcionando únicamente integridad, únicamente privacidad o, curiosamente, integridad con privacidad. Utilizando este nuevo modelo también se redefine un esquema altamente eficiente, construido en [12] y que se ha denominado Outsourcinglin. Este esquema permite calcular polinomios multivariados de grado 1 sobre el anillo Z2k . Desde el punto de vista de la contribución práctica, se ha construido una infraestructura marco (“Framework”) para aplicar el esquema de “outsourcing”. Seguidamente, se ha testado dicho “Framework” con varias implementaciones, en concreto la implementación del criptosistema Joye-Libert ([18]) y la implementación del esquema propio Outsourcinglin. En el contexto de este trabajo práctico, la tesis también ha dado lugar a algunas contribuciones innovadoras: el diseño y la implementación de un nuevo algoritmo de descifrado para el esquema de cifrado Joye-Libert, en colaboración con Darío Fiore. Presenta un mejor comportamiento frente a los algoritmos propuestos por los autores de [18];la implementación de la función eficiente pseudo-aleatoria de forma amortizada cerrada (“amortized-closed-form efficient pseudorandom function”) de [12]. Esta función no se había implementado con anterioridad y no supone un problema trivial, por lo que este trabajo puede llegar a ser útil en otros contextos. Finalmente se han usado las implementaciones durante varias pruebas para medir tiempos de ejecución de los principales algoritmos.---ABSTRACT---In this thesis we tackle the problem of secure outsourcing of data and computation. The scenario we are interested in is that in which a user owns some data and wants to “outsource” it to a Cloud server. Furthermore, the user may want also to delegate the computation over a subset of its data to the server. We present the security issues related to this scenario, namely integrity and privacy and we analyse some possible solutions to these two issues, exploiting advanced cryptographic tools, such as Homomorphic Message Authenticators and Fully Homomorphic Encryption. Our contribution is both theoretical and practical. Considering our theoretical contribution, using as starting points the articles of [3] and [12], we introduce a new cryptographic primitive, called Outsourcing with the aim of realizing a very generic and flexible model that might be employed to represent several secure outsourcing schemes. Such model can be used to represent secure outsourcing schemes that provide only integrity, only privacy or, interestingly, integrity with privacy. Using our new model we also re-define an highly efficient scheme constructed in [12], that we called Outsourcinglin and that is a scheme for computing multi-variate polynomials of degree 1 over the ring Z2k. Considering our practical contribution, we build a Framework to implement the Outsourcing scheme. Then, we test such Framework to realize several implementations, specifically the implementation of the Joye-Libert cryptosystem ([18]) and the implementation of our Outsourcinglin scheme. In the context of this practical work, the thesis also led to some novel contributions: the design and the implementation, in collaboration with Dario Fiore, of a new decryption algorithm for the Joye-Libert encryption scheme, that performs better than the algorithms proposed by the authors in [18]; the implementation of the amortized-closed-form efficient pseudorandom function of [12]. There was no prior implementation of this function and it represented a non trivial work, which can become useful in other contexts. Finally we test the implementations to execute several experiments for measuring the timing performances of the main algorithms.