39 resultados para Connectivity,Connected Car,Big Data,KPI
Resumo:
Tämän diplomityön tarkoituksena oli tehdä selvitys EDI:in liittyvistä vaikutuksista, tarpeista ja eduista sekä valmistella Oracle Applications- toiminnanohjausjärjestelmän EDI Gateway- modulin ottamista tuotantokäyttöön. Tietoa tarvekartoitukseen saatiin keskustelujen avulla. Uusia kaupallisista lähtökohdista johdettuja, yritysten väliseen kaupankäyntiin ja internet-teknologian hyödyntämiseen kehitettyjä aloitteita käsiteltiin EDI-näkökulmasta tulevaisuutta varten. Ajankohtaisinta tietoa tätä diplomityötä varten löydettiin myös internetistä. Tämän jälkeen oli mahdollista toteuttaa sopivan laaja mutta rajattu EDI pilottiprojekti EDI-konseptin luomista varten. EDI:n vaikutuksiin ostossa keskityttiin tässä diplomityössä enemmän ja EDI:ä päätettiin soveltaa aluksi ostotilauksissa. EDI:n hyötyjä on vaikea mitata numeerisesti. Suurta määrää rahaa tai tuoteyksiköitä on käsiteltävä EDI-partnerin kanssa riittävän usein. EDI:n käyttöönottovaiheessa pääongelmat ovat sovelluksiin liittyviä tietotekniikkaongelmia. Selvityksistä ja EDI-projektista saatu tieto on mahdollista hyödyntää jatkokehityksessä. Lisätoimenpiteitä tarvitaan kokonaan toimivan järjestelmän luomiseksi.
Resumo:
Connectivity depends on rates of dispersal between communities. For marine soft-sediment communities continued small-scale dispersal as post-larvae and as adults can be equally important in maintaining community composition, as initial recruitment of substrate by pelagic larvae. In this thesis post-larval dispersal strategies of benthic invertebrates, as well as mechanisms by which communities are connected were investigated. Such knowledge on dispersal is scarce, due to the difficulties in actually measuring dispersal directly in nature, and dispersal has not previously been quantified in the Baltic Sea. Different trap-types were used underwater to capture dispersing invertebrates at different sites, while in parallel measuring waves and currents. Local community composition was found to change predictably under varying rates of dispersal and physical connectivity (waves and currents). This response was, however, dependent on dispersal-related traits of taxa. Actively dispersing taxa will be relatively better at maintaining their position, as they are not as dependent on hydrodynamic conditions for dispersal and will be less prone to be passively transported by currents. Taxa also dispersed in relative proportions that were distinctly different from resident community composition and a significant proportion (40 %) of taxa were found to lack a planktonic larval life-stage. Community assembly was re-started in a large-scale manipulative field experiment over one year across several sites, which revealed how patterns of community composition (α-, β- and λ-diversity) change depending on rates of dispersal. Results also demonstrated that in response to small-scale disturbance, initial recruitment was by nearby-dominant species after which other species arrived from successively further away. At later assembly time, the number of coexisting species increased beyond what was expected purely by local niche requirements (species sorting), transferring regional differences in community composition (β-diversity) to the local scale (α-diversity, mass effect). Findings of this thesis complement more theoretical studies in metacommunity ecology by demonstrating that understanding how and when individuals disperse relative to underlying environmental heterogeneity is key to interpreting how patterns of diversity change across different spatial scales. Such information from nature is critical when predicting responses to, for example, different types of disturbances or management actions in conservation.
Resumo:
In the beginning of its 10th year of existence Facebook has engaged and connected 1.2 billion monthly active users. This article-based dissertation Disconnect.Me – User Engagement and Facebook approaches this engagement from the opposite direction: disconnection. The research articles focus on social media specific phenomena including leaving Facebook, tactical media works such as Web 2.0 SuicideMachine, memorializing dead Facebook users and Facebook trolling. The media theoretical framework for this study is built around affect theory, software studies, biopolitics as well as different critical studies of new media. The argument is that disconnection is a necessary condition of social media connectivity and exploring social media through disconnection – as an empirical phenomenon, future potential and theoretical notion – helps us to understand how users are engaged with social media, its uses and subsequent business models. The results of the study indicate that engagement is a relation that precedes user participation, a notion often used to conceptualize social media. Furthermore, this engagement turns the focus from users’ actions towards the platform and how the platform actively controls users and their behavior. Facebook aims to engage new users and maintain the old ones by renewing its platform and user interface. User engagement with the platform is thus social but also technical and affective. When engaged, the user is positioned to algorithmic connectivity where machinc processes mine user data. This data is but sold also used to affect and engage other users. In the heart of this study is the notion that our networked engagements matter and disconnection can bring us to the current limits of network culture.
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014
Resumo:
Nowadays global business trends force the adoption of innovative ICTs into the supply chain management (SCM). Particularly, the RFID technology is on high demand among SCM professionals due to its business advantages such as improving of accuracy and veloc-ity of SCM processes which lead to decrease of operational costs. Nevertheless, a question of the RFID technology impact on the efficiency of warehouse processes in the SCM re-mains open. The goal of the present study is to experiment the possibility of improvement order picking velocity in a warehouse of a big logistics company with the use of the RFID technology. In order to achieve this goal the following objectives have been developed: 1) Defining the scope of the RFID technology applications in the SCM; 2) Justification of the RFID technology impact on the SCM processes; 3) Defining a place of the warehouse order picking process in the SCM; 4) Identification and systematization of existing meth-ods of order picking velocity improvement; 5) Choosing of the study object and gathering of the empirical data about number of orders, number of hours spent per each order line daily during 5 months; 6) Processing and analysis of the empirical data; 7) Conclusion about the impact of the RFID technology on the speed of order picking process. As a result of the research it has been found that the speed of the order picking processes has not been changed as time has gone after the RFID adoption. It has been concluded that in order to achieve a positive effect in the speed of order picking process with the use of the RFID technology it is necessary to simultaneously implement changes in logistics and organizational management in 3PL logistics companies. Practical recommendations have been forwarded to the management of the company for further investigation and procedure.
Resumo:
Since 2008, One of the International Accounting Standards Board’s (IASB) objective has been to replace the old IAS 39 – Financial Instruments standard. IASB achieved this objective in July 2014 when they published the new IFRS 9 – Financial Instruments after many phases. In this study, the main purpose was to find out how the Big Four – audit entities have welcomed the different reforms which IFRS 9 brings to the treatment of financial instruments in the financial statements. Alongside with this, the study presents a short overview to the common attitude towards the new standard. The study proceeds so that the most siginificant reforms have been divided into three main categories and inside of these more precisely to single reforms. This study is based on the qualitative research method. The empirical data of the study consists of comment letters by the Big Four – entities, which have been sent to the IASB regarding Exposure Drafts (ED) of IFRS 9. In total IASB received 757 comment letters regarding to the specific EDs. In this study the population were restricted to 16 comment letters sent by the Big Four – entities. The data is available at IFRS Foundation’s website. According to the research results Big Four – entities think that the reforms which IFRS 9 brings are mainly welcome. In its entirety Big Four – entities consider IFRS 9 better than its predecessor IAS 39. There were differnces in opinions towards IFRS 9 and specific reforms among the Big Four - entities. According to the findings the best reforms were related to the efficiency demands of hedge accounting and to impairments and the valuation of credit losses. The least popular reforms were the reforms regarding the measurement of financial assets and liabilities; more specifically fair value option and the reforms concerning equity instruments were viewed as most challenging.
Resumo:
Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.
Resumo:
Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.