64 resultados para Work sharing
Resumo:
This paper analyzes the Nova Student Portfolio (NSP) with the objective to understand performances of the fund. Each investment style has been analyzed (growth, value and momentum) in order to highlight what style allocation contributed positively and which had a negative impact. The results show that the team mainly invested in value stocks, which contributed positively but that its growth investments had a negative impact on the stock picking performance. The stock selection shows a major influence of the value investment style. A statistical approach shows that the market factor was the one explaining the most the NSP returns.
Resumo:
The study now presented a research study aimed at the exercise of security activity of the prison guard corps (CGP) in the specific context of the prison system (SP). The study also focused on the phenomenon of globalization and its influence on the current panorama of world crime and their relationship with the prison security object of study was the security activity of the CGP on the current inmate population, as well as the typology of crimes inherent to it and that requires the interpretation of the amendment to the correctional paradigm. In the preparation of the study we have tried to identify the legal framework of the profession based on the main laws and decree-laws governing the institution DGRSP and CGP's career. The difficulties and constraints were analyzed the performance of the security function of the CGP, resulting from the infrastructure, the interaction with the inmates and the need of assigning the status of Criminal Police (OPC). Really connected the relevant importance of OPC so the Corporation can establish a cooperation interaction and sharing of information with different security forces. We noted the importance of the CGP being OPC status before the framework for its action in work situations, specifically, on gatehouses, prison wings, area, and high-complexity operations such as escorts and riot control interventions.The explanation of this study enabled us to assess the importance of the actions of a police officer of the elements of the CGP for maintaining internal security. The analyses and studies were complemented by twenty years of career and exercise of the activity of the master's degree, during which time he served as guard and head of the CGP, the intervention Group and Prison Security, the Lisbon Prison, Prison, Prison of Caxias, Sintra and Monsanto.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.
Resumo:
In seeking to advance the possibility of justice, gender and postcolonial studies have argued for the importance of the study of masculinities, through the acknowledgment that a richer understanding of such gendered formations may provide the basis for recognition of the Other and that, left uncriticised, such formations may be continuously delineated by the reproduction of systems of domination. The current study finds as its object the representations of masculinities in J. M. Coetzee’s Boyhood (1997), Youth (2002) and Summertime (2009). As works of transition in terms of Coetzee’s oeuvre - post-apartheid and post-Disgrace - the trilogy provides an account of the development of a man through several stages of life. While portraying the tensions of different geographical and cultural locations, such as apartheid South Africa and the London of the Sixties, the trilogy articulates the various norms that impact in the formation of gender, particularly of masculinities, through a complex system of power relations. The adherence to such norms is never linear, as the trilogy provides imaginative accounts of the contradictions that assist in the formulation of gender, depicting both the allure and the terror that constitute hegemonic masculinity. Located in the intersection of gender and postcolonial studies, the present study is based on the works by Raewyn Connell on masculinities. Animated by such a critical framework, the main research question of the present study is whether the trilogy advances a notion of masculinity that differs from the traditional rigid model, that is, whether there is resistance to hegemonic masculinity and what the spaces inhabited by the subaltern are. It is suggested that the trilogy presents the reader with instances of resistance to normative formulations of masculinity, by contrasting domination with the possibility of justice, and advancing an understanding of the often fatal consequences of gender norms to one’s sense of being in the world.