60 resultados para Forced IP protection
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
The intellectual property (IP) environment in China is still very immature. There are several problems in legal, political, economic, social-cultural, competitive and labor environment which have hindered IP legal enforcement. Under such circumstances, IP misappropriation is a major concern especially for foreign small and medium-sized enterprises (SMEs) doing business in China. These circumstances require foreign companies, no matter whether they are multinational corporations (MNCs) or SMEs and have own manufacturing in China or not, to take strong IP actions. Therefore, the purpose of this study is to discuss how IP can be protected in China in the case of outsourcing and in the case of own manufacturing. The comparison will consider the process of outsourcing and own manufacturing consisting two stages: preparation stage and operation stage. In order to clarify the conceptual arguments, two illustrative case studies were studied. The case data bases on two semi-structured interviews of the managing directors, field notes and archival data. The findings propose that attention in IP protection should be given to following issues: integrating IP strategy into the company’s business strategy, protecting the most critical knowledge, regarding IP steps as a whole in the protection mechanism and making IP strategy as proactive as possible. The major difference between outsourcing and own manufacturing in IP protection is in the operation stage. Besides, the findings also provide managerial advice on IP protection, e.g. foreign managers should be prepared for IP risks in China, they should establish an own IP protection mechanism which matches the company’s situation and they should consider IP protection as an on-going process.
Resumo:
Tässä diplomityössä tutkittiin vaihtoehtoja tehoelektroniikkalaitteiden kotelointiluokan kehittämiseksi. Haasteena paremman suojauksen suunnittelussa on laitteiden tuottama suuri määrä lämpöä, joka vaatii tehokkaan jäähdytyksen. Työn tuloksena saatu prototyyppi IP33 luokkaa varten täyttää standardissa SFS-EN 60529+A1 asetetut vaatimukset kyseiselle kotelointiluokalle. Rakenteessa ja valmistettavuudessa havaittiin muutama ongelma, jotka ovat korjattavissa pienillä muutoksilla. Korkeampia suojausluokkia varten testattiin IP54-luokiteltujen filtterituulettimien vaikutusta laitteen jäähdytykseen. Testien perusteella jäähdytysteho on riittävä ja filtterituulettimet todettiin toimivaksi ratkaisuksi korkeammille suojausluokille. Työn perusteella voidaan todeta, että nykyiset laitteet voidaan muokata vastaamaan IP33 luokan vaatimuksia kohtuullisen pienillä muutoksilla. Tätä korkeammat suojausluokat vaatisivat niin suuria muutoksia designiin, että todennäköisesti täysin uuden laitteen suunnittelu olis kannattavin vaihtoehto.
Resumo:
Tässä insinöörityössä käsitellään Elisa OYJ:ssä käytössä olevia keskitettyjä IP-vaihdepalveluja. Työn tarkoituksena on tarkastella kolmen eri vaihdevalmistajan, Siemensin, Ciscon ja Centilen, keskitettyjä IP-vaihderatkaisuja. Työn tarkoituksena on myös tu-tustuttaa perinteisen puhelintekniikan parissa työskenteleviä ihmisiä VOIP-järjestelmiin. Työssä tarkastellaan yleisesti VOIPia henkilöasiakkaan, yritysasiakkaan ja laitevalmistajan näkökulmista, perehdytään IP-vaihteiden rakenteisiin ja palveluihin, käsitellään IP-vaihteiden hallintaa, viankorjausta ja valvontaa sekä käydään läpi IP-vaihteiden kustannuksellis - toiminnallinen vertailu. Yhteenvetona voidaan todeta, että tällä hetkellä perinteisien puhelinjärjestelmävalmistajien IP-vaihteet tarjoavat monipuolisemmat toiminnot kuin uusien vaihdevalmistajien IP-vaihteet.
Resumo:
Summary
Resumo:
[Abstract]
Resumo:
Selostus: Tulokastuholaiset ja kasvinsuojelu : taloudellinen näkökulma
Resumo:
Tutkimuksen tavoitteena oli luoda yleiskuva muuttuvasta televisioliiketoiminnasta ja tuoda esille niin muutokseen vaikuttavat tekijät kuin muutosta seuraavat kehityssuunnat. Tämän lisäksi pyrittiin hahmottamaan mahdollisia televisiotoimialan tulevaisuuden kuvia. Aiheen laajuuden takia tutkimus rajattiin koskemaan Suomen televisiotoimialaa. Tutkimuksessa selvitettiin haastatteluiden, artikkelien ja tutkimusraporttien pohjalta tärkeimmät muutokseen vaikuttavat tekijät ja kehityssuunnat. Tämän lisäksi arvioitiin niin kuluttajien vaikutusta muutokseen kuin muutoksen vaikutusta arvoketjuun. Tulosten pohjalta rakennettiin kolme tulevaisuuden skenaariota ja lopuksi liiketoimintamalleja arvioitiinkussakin skenaariossa. Skenaarioiden teemat olivat 'yhteiskunta ohjaa kehitystä', 'jakeluyhtiöt hallitsevat toimialaa- ja -kuluttaja on kuningas'. Kolmas skenaario, joka herätti eniten keskustelua ja mielenkiintoa, nousiselvästi esiin kahdesta muusta.
Resumo:
Prosessitietoliikenneverkko toimii mm. energian tuotannon, siirron ja jakelun käytönvalvontajärjestelmien tiedonsiirron alustana. Tietoliikenneverkkojen rooli osana yrityksen operatiivisia prosesseja kasvaa järjestelmäuusintojen myötä ja järjestelmien tehokas hyödyntäminen vaatii luotettavat sekä nopeat tietoverkot. Uusittavien järjestelmien tietoliikenneratkaisut perustuvat pääsääntöisesti Ethernetpohjaiseen TCP/IP-verkkotekniikkaan. Tällä hetkellä prosessijärjestelmien tiedonsiirtoyhteydet kenttälaitteiden ja valvomojärjestelmien välillä on pääsääntöisesti toteutettu PCM-siirtojärjestelmällä tai kiinteän yhteyden modeemeilla. Käytössä oleva PCM-tekniikka on elinkaarensa loppupuolella ja tiedonsiirtonopeudet sekä liityntärajapinnat eivät täytä nykyaikaisten prosessijärjestelmien tiedonsiirto¬vaatimuksia. Työssä käytiin läpikeskeisimmät Ethernet-tekniikkaan ja TCP/IP-protokollaperheeseen liittyvät standardit ja verkon aktiivilaitteet. Vaatimusmäärittelyissä selvitettiin Helsingin Energian eri liiketoimintayksiköiden tarpeita sekä energia-alan lainsäädännön vaatimuksia prosessitietoliikenneverkolle. Tarpeiden ja vaatimusten pohjalta verrattiin kolmea eri vaihtoehtoista verkkotekniikkaa: kytkintekniikkaa, reititintekniikkaa ja MPLS-tekniikkaa. Vertailun perusteella valitulla verkkotekniikalla tehtiin suunnitelma avoimesta, valmistajasta riippumattomasta standardeihin perustuvasta yritystason Ethernet-pohjaisesta TCP/IP prosessiverkkoratkaisusta. Johtopäätöksissä pohditaan valitun ratkaisun käytettävyyttä, tietoturvaa sekä toimenpiteitä niiden kehittämiseksi.
Resumo:
The nature of client-server architecture implies that some modules are delivered to customers. These publicly distributed commercial software components are under risk, because users (and simultaneously potential malefactors) have physical access to some components of the distributed system. The problem becomes even worse if interpreted programming languages are used for creation of client side modules. The language Java, which was designed to be compiled into platform independent byte-code is not an exception and runs the additional risk. Along with advantages like verifying the code before execution (to ensure that program does not produce some illegal operations)Java has some disadvantages. On a stage of byte-code a java program still contains comments, line numbers and some other instructions, which can be used for reverse-engineering. This Master's thesis focuses on protection of Java code based client-server applications. I present a mixture of methods to protect software from tortious acts. Then I shall realize all the theoretical assumptions in a practice and examine their efficiency in examples of Java code. One of the criteria's to evaluate the system is that my product is used for specialized area of interactive television.
Resumo:
Pro-gradu tutkielman tavoitteena on tutkia, miten yritykset tasapainoilevat tiedon jakamisen ja suojaamisen välillä innovaatioyhteistyöprojekteissa, ja miten sopimukset, immateriaalioikeudet ja luottamus voivat vaikuttaa tähän tasapainoon. Yhteistyössä yritysten täytyy jakaa tarpeellista tietoa kumppanilleen, mutta toisaalta niiden täytyy varoa, etteivät ne menetä ydinosaamiseensa kuuluvaa tietoa ja kilpailuetuaan. Yrityksillä on useita keinoja tietovuodon estämiseen. Tutkielmassa keskitytään patenttien, sopimusten ja liikesalaisuuksien käyttöön tietoa suojaavina mekanismeina. Kyseiset suojamekanismit vaikuttavat luottamukseen kumppaneiden välillä, ja täten myös näiden halukkuuteen jakaa tietoa kumppaneilleen. Jos kumppanit eivät jaa tarpeeksi tietoa toisilleen, voi yhteistyö epäonnistua. Sopimusten, immateriaalioikeuksien ja luottamuksen rooleja ja vuorovaikutusta tutkitaan kahdenvälisissä yhteistyöprojekteissa. Tutkielmassa esitellään neljä case-esimerkkiä, jotka on koottu suomalaisen metsätoimialan yrityksen haastatteluista.
Resumo:
This study focuses on the status of using the Internet in partnership development. The aim is to find out howthe parties in partnership can benefit from the available data networks (the Internet, Intranet and Extranet). The study also explains what the typical practices at the moment are and what features might be exploitable in the future. The research problem is to find out whether there are any possibilities to utilize the web more than is done at the moment. This study is a preliminary study for a more extensive study on the topic 'Information Technology in Business Relationships'.
Resumo:
The application of forced unsteady-state reactors in case of selective catalytic reduction of nitrogen oxides (NOx) with ammonia (NH3) is sustained by the fact that favorable temperature and composition distributions which cannot be achieved in any steady-state regime can be obtained by means of unsteady-state operations. In a normal way of operation the low exothermicity of the selective catalytic reduction (SCR) reaction (usually carried out in the range of 280-350°C) is not enough to maintain by itself the chemical reaction. A normal mode of operation usually requires supply of supplementary heat increasing in this way the overall process operation cost. Through forced unsteady-state operation, the main advantage that can be obtained when exothermic reactions take place is the possibility of trapping, beside the ammonia, the moving heat wave inside the catalytic bed. The unsteady state-operation enables the exploitation of the thermal storage capacity of the catalyticbed. The catalytic bed acts as a regenerative heat exchanger allowing auto-thermal behaviour when the adiabatic temperature rise is low. Finding the optimum reactor configuration, employing the most suitable operation model and identifying the reactor behavior are highly important steps in order to configure a proper device for industrial applications. The Reverse Flow Reactor (RFR) - a forced unsteady state reactor - corresponds to the above mentioned characteristics and may be employed as an efficient device for the treatment of dilute pollutant mixtures. As a main disadvantage, beside its advantages, the RFR presents the 'wash out' phenomena. This phenomenon represents emissions of unconverted reactants at every switch of the flow direction. As a consequence our attention was focused on finding an alternative reactor configuration for RFR which is not affected by the incontrollable emissions of unconverted reactants. In this respect the Reactor Network (RN) was investigated. Its configuration consists of several reactors connected in a closed sequence, simulating a moving bed by changing the reactants feeding position. In the RN the flow direction is maintained in the same way ensuring uniformcatalyst exploitation and in the same time the 'wash out' phenomena is annulated. The simulated moving bed (SMB) can operate in transient mode giving practically constant exit concentration and high conversion levels. The main advantage of the reactor network operation is emphasizedby the possibility to obtain auto-thermal behavior with nearly uniformcatalyst utilization. However, the reactor network presents only a small range of switching times which allow to reach and to maintain an ignited state. Even so a proper study of the complex behavior of the RN may give the necessary information to overcome all the difficulties that can appear in the RN operation. The unsteady-state reactors complexity arises from the fact that these reactor types are characterized by short contact times and complex interaction between heat and mass transportphenomena. Such complex interactions can give rise to a remarkable complex dynamic behavior characterized by a set of spatial-temporal patterns, chaotic changes in concentration and traveling waves of heat or chemical reactivity. The main efforts of the current research studies concern the improvement of contact modalities between reactants, the possibility of thermal wave storage inside the reactor and the improvement of the kinetic activity of the catalyst used. Paying attention to the above mentioned aspects is important when higher activity even at low feeding temperatures and low emissions of unconverted reactants are the main operation concerns. Also, the prediction of the reactor pseudo or steady-state performance (regarding the conversion, selectivity and thermal behavior) and the dynamicreactor response during exploitation are important aspects in finding the optimal control strategy for the forced unsteady state catalytic tubular reactors. The design of an adapted reactor requires knowledge about the influence of its operating conditions on the overall process performance and a precise evaluation of the operating parameters rage for which a sustained dynamic behavior is obtained. An apriori estimation of the system parameters result in diminution of the computational efforts. Usually the convergence of unsteady state reactor systems requires integration over hundreds of cycles depending on the initial guess of the parameter values. The investigation of various operation models and thermal transfer strategies give reliable means to obtain recuperative and regenerative devices which are capable to maintain an auto-thermal behavior in case of low exothermic reactions. In the present research work a gradual analysis of the SCR of NOx with ammonia process in forced unsteady-state reactors was realized. The investigation covers the presentationof the general problematic related to the effect of noxious emissions in the environment, the analysis of the suitable catalysts types for the process, the mathematical analysis approach for modeling and finding the system solutions and the experimental investigation of the device found to be more suitable for the present process. In order to gain information about the forced unsteady state reactor design, operation, important system parameters and their values, mathematical description, mathematicalmethod for solving systems of partial differential equations and other specific aspects, in a fast and easy way, and a case based reasoning (CBR) approach has been used. This approach, using the experience of past similarproblems and their adapted solutions, may provide a method for gaining informations and solutions for new problems related to the forced unsteady state reactors technology. As a consequence a CBR system was implemented and a corresponding tool was developed. Further on, grooving up the hypothesis of isothermal operation, the investigation by means of numerical simulation of the feasibility of the SCR of NOx with ammonia in the RFRand in the RN with variable feeding position was realized. The hypothesis of non-isothermal operation was taken into account because in our opinion ifa commercial catalyst is considered, is not possible to modify the chemical activity and its adsorptive capacity to improve the operation butis possible to change the operation regime. In order to identify the most suitable device for the unsteady state reduction of NOx with ammonia, considering the perspective of recuperative and regenerative devices, a comparative analysis of the above mentioned two devices performance was realized. The assumption of isothermal conditions in the beginningof the forced unsteadystate investigation allowed the simplification of the analysis enabling to focus on the impact of the conditions and mode of operation on the dynamic features caused by the trapping of one reactant in the reactor, without considering the impact of thermal effect on overall reactor performance. The non-isothermal system approach has been investigated in order to point out the important influence of the thermal effect on overall reactor performance, studying the possibility of RFR and RN utilization as recuperative and regenerative devices and the possibility of achieving a sustained auto-thermal behavior in case of lowexothermic reaction of SCR of NOx with ammonia and low temperature gasfeeding. Beside the influence of the thermal effect, the influence of the principal operating parameters, as switching time, inlet flow rate and initial catalyst temperature have been stressed. This analysis is important not only because it allows a comparison between the two devices and optimisation of the operation, but also the switching time is the main operating parameter. An appropriate choice of this parameter enables the fulfilment of the process constraints. The level of the conversions achieved, the more uniform temperature profiles, the uniformity ofcatalyst exploitation and the much simpler mode of operation imposed the RN as a much more suitable device for SCR of NOx with ammonia, in usual operation and also in the perspective of control strategy implementation. Theoretical simplified models have also been proposed in order to describe the forced unsteady state reactors performance and to estimate their internal temperature and concentration profiles. The general idea was to extend the study of catalytic reactor dynamics taking into account the perspectives that haven't been analyzed yet. The experimental investigation ofRN revealed a good agreement between the data obtained by model simulation and the ones obtained experimentally.
Resumo:
1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.
Resumo:
Tämä diplomityö käsittelee kolmannen sukupolven matkaviestinjärjestelmien kuljetuskerroksen mitoitusta. Nykyisten matkapuhelinverkkojen korvaajiksi suunnitellut kolmannen sukupolven matkaviestinjärjestelmät tulevat yhdistämään perinteisen puhelinviestinnän ja uudenlaiset datapalvelut. Uudet verkot tulevat perustumaan pakettivälitteiseen tiedonsiirtoon joka mahdollistaa molempien liikennetyyppien, puheen sekä datan, siirtämisen samassa verkossa. Tämän ratkaisun uskotaan tarjoavan paremmat mahdollisuudet uusien palvelujen luomiseen ja parantavan tiedonsiirtokapasiteettia. Siirtyminen pakettivälitteiseen tiedonsiirtoon aiheuttaa kuitenkin suuria muutoksia verkkoarkkitehtuurissa. Tässä diplomityössä tarkastellaan tulevien runkoverkkojen mitoitukseen liittyviä näkökohtia sekä muodostetaan alustavia kuljetuskerroksen mitoitusohjeita. Diplomityö on tehty osaksi diplomi-insinöörin tutkintoa Lappeenrannan teknillisessä korkeakoulussa. Työ on tehty Nokia Networksin palveluksessa Helsingissä, vuoden 2000 toisella puoliskolla.
Resumo:
IP-verkoissa tarjottavat palvelut ovat lisääntyneet, on tullut uusia kanavia, jotka tarjoavat IP-pohjaisia palveluja. Internet-palvelujen tarjonta on tullut mukaan kaapelitelevisio- ja matkapuhelinverkkoihin. Lisääntynyt palvelujen tarjonta ja kysyntä ovat lisänneet palvelujen hallinnan merkitystä. IP-verkoissa on ilmennyt turvallisuuteen, skaalattavuuteen ja palvelun laatuun liittyviä ongelmia. Palvelun laadun tärkeys painottuu reaaliaikaisuutta ja suurta kapasiteettia vaativissa sovelluksissa. Tulevaisuudessa IP-liikenteen on ennustettu kasvavan yli satakertaiseksi nykyisestä tasosta kolmen vuoden kuluessa. Tämän vuoksi on kehitetty uusi verkon ja palvelun hallintamenetelmiä, joista tässä työssä on tutkittu sääntöpohjaista verkon hallintaa.