2 resultados para Training and teachings practices
em Galway Mayo Institute of Technology, Ireland
Resumo:
The sustained economic growth that has been experienced in the Irish economy in recent years has relied, to a large extent, on the contribution and performance of those industry sectors that possess the ability to provide high-value-added products and services to domestic and international markets. One such contributor has been the Technology sector. However, the performance of this sector relies upon the availability of the necessary capabilities and competencies for Technology companies to remain competitive. The Expert Group on Future Skills Needs have forecasted future skills shortages in this sector. The purpose of this research has been to examine the extent to which Irish Technology companies are taking measures to meet changing skills requirements, through training and development interventions. Survey research methods (in the form of a mail questionnaire, supported by a Web-based questionnaire) have been used to collect information on the expenditure on, and approach to, training and development in these companies, in addition to the methods, techniques and tools/aids that are used to support the delivery of these activities. The contribution of Government intervention has also been examined. The conclusions have been varied. When the activities of the responding companies are considered in isolation, the picture to emerge is primarily positive. Although the expenditure on training and development is slightly lower than that indicated in previous studies, the results vary by company size. Technical employees are clearly the key focus of training provision, while Senior Managers and Directors, Clerical and Administrative staff and Manual workers are a great deal more neglected in training provision. Expenditure on, and use of, computer-based training methods is high, as is the use of most of the specified techniques for facilitating learning. However, when one considers the extent to which external support (in the form of Government interventions and cooperation with other companies and with education and training providers) is integrated into the overall training practices of these companies, significant gaps in practice are identified. The thesis concludes by providing a framework to guide future training and development practices in the Technology sector.
Resumo:
Although the ASP model has been around for over a decade, it has not achieved the expected high level of market uptake. This research project examines the past and present state of ASP adoption and identifies security as a primary factor influencing the uptake of the model. The early chapters of this document examine the ASP model and ASP security in particular. Specifically, the literature and technology review chapter analyses ASP literature, security technologies and best practices with respect to system security in general. Based on this investigation, a prototype to illustrate the range and types of technologies that encompass a security framework was developed and is described in detail. The latter chapters of this document evaluate the practical implementation of system security in an ASP environment. Finally, this document outlines the research outputs, including the conclusions drawn and recommendations with respect to system security in an ASP environment. The primary research output is the recommendation that by following best practices with respect to security, an ASP application can provide the same level of security one would expect from any other n-tier client-server application. In addition, a security evaluation matrix, which could be used to evaluate not only the security of ASP applications but the security of any n-tier application, was developed by the author. This thesis shows that perceptions with regard to fears of inadequate security of ASP solutions and solution data are misguided. Finally, based on the research conducted, the author recommends that ASP solutions should be developed and deployed on tried, tested and trusted infrastructure. Existing Application Programming Interfaces (APIs) should be used where possible and security best practices should be adhered to where feasible.